Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-1012 (GCVE-0-2022-1012)
Vulnerability from cvelistv5
| URL | Tags | ||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T23:47:42.922Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://lore.kernel.org/lkml/20220427065233.2075-1-w%401wt.eu/T/"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20221020-0006/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Kernel",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Linux kernel version prior to 5.18-rc6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-401",
"description": "CWE-401",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-10-20T00:00:00",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"url": "https://lore.kernel.org/lkml/20220427065233.2075-1-w%401wt.eu/T/"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"url": "https://security.netapp.com/advisory/ntap-20221020-0006/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2022-1012",
"datePublished": "2022-08-05T00:00:00",
"dateReserved": "2022-03-17T00:00:00",
"dateUpdated": "2024-08-02T23:47:42.922Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-1012\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2022-08-05T16:15:11.370\",\"lastModified\":\"2024-11-21T06:39:51.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado un problema de p\u00e9rdida de memoria en el algoritmo de generaci\u00f3n de puertos de origen TCP en el archivo net/ipv4/tcp.c debido al peque\u00f1o tama\u00f1o de la tabla de perturbaci\u00f3n. Este fallo puede permitir a un atacante un filtrado de informaci\u00f3n y puede causar un problema de denegaci\u00f3n de servicio\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.18\",\"matchCriteriaId\":\"FE93544F-B946-47CF-9697-FBF3484FCB92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.18:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"0384FA0A-DE99-48D7-84E3-46ED0C3B5E03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD94161-84BB-42E6-9882-4FC0C42E9FC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AB06DDF-3C2B-416D-B448-E990D8FF67A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAE6C6C5-4D21-4C04-897C-70CBBB3D7B91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA5F085D-52F3-4EE2-8353-455D1A6FE073\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6EE5B78-0D83-4715-893C-ABD69B49E7FC\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2064604\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lore.kernel.org/lkml/20220427065233.2075-1-w%401wt.eu/T/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20221020-0006/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2064604\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lore.kernel.org/lkml/20220427065233.2075-1-w%401wt.eu/T/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20221020-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
RHSA-2022:6551
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nThe following packages have been upgraded to a later upstream version: redhat-release-virtualization-host (4.5.2), redhat-virtualization-host (4.5.2), redhat-virtualization-host-productimg (4.5.2). (BZ#2070049, BZ#2093195)\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132)\n\n* systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c (CVE-2022-2526)\n\n* kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)\n\n* rsync: remote arbitrary files write inside the directories of connecting peers (CVE-2022-29154)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:6551",
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "2099475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099475"
},
{
"category": "external",
"summary": "2107498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107498"
},
{
"category": "external",
"summary": "2109393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109393"
},
{
"category": "external",
"summary": "2109926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109926"
},
{
"category": "external",
"summary": "2110928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110928"
},
{
"category": "external",
"summary": "2114849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114849"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6551.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization security update",
"tracking": {
"current_release_date": "2025-10-09T22:12:20+00:00",
"generator": {
"date": "2025-10-09T22:12:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:6551",
"initial_release_date": "2022-09-19T11:53:21+00:00",
"revision_history": [
{
"date": "2022-09-19T11:53:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-09-19T11:53:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:12:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.2-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"product_id": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.2-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"product": {
"name": "redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"product_id": "redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.5.2-202209140405_8.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.2-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.5.2-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64",
"product_id": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.5.2-202209140405_8.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.5.2-1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.5.2-202209140405_8.6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src"
},
"product_reference": "redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Cong Wang"
],
"organization": "China Telecom"
}
],
"cve": "CVE-2022-2132",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-06-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2099475"
}
],
"notes": [
{
"category": "description",
"text": "A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Container Platform (OCP) the openvswitch rpm package is consumed from the RHEL Fast Datapath repositories, hence OCP openvswitch components are marked as \"Will not fix\".",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2132"
},
{
"category": "external",
"summary": "RHBZ#2099475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2132"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2132",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2132"
},
{
"category": "external",
"summary": "https://bugs.dpdk.org/show_bug.cgi?id=1031",
"url": "https://bugs.dpdk.org/show_bug.cgi?id=1031"
}
],
"release_date": "2022-08-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs"
},
{
"acknowledgments": [
{
"names": [
"Siddharth Sharma"
],
"organization": "Red Hat Product Security",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2022-2526",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-07-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2109926"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in \u0027resolved-dns-stream.c\u0027 not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as important because this flaw can easily compromise the confidentiality, integrity, or availability of resources but that allows local or authenticated users to gain additional privileges, allow unauthenticated remote users to view resources that should otherwise be protected by authentication or other controls, allow authenticated remote users to execute arbitrary code, or allow remote users to cause a denial of service. But this flaw does not easily exploit by a remote unauthenticated attacker.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2526"
},
{
"category": "external",
"summary": "RHBZ#2109926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109926"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2526"
}
],
"release_date": "2022-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c"
},
{
"acknowledgments": [
{
"names": [
"Zhenpeng Lin"
]
}
],
"cve": "CVE-2022-2588",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-08-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2114849"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in route4_change in the net/sched/cls_route.c filter implementation in the Linux kernel. This flaw allows a local user to crash the system and possibly lead to a local privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2588"
},
{
"category": "external",
"summary": "RHBZ#2114849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114849"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2588"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u",
"url": "https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u"
}
],
"release_date": "2022-08-09T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Ege BALCI"
],
"organization": "PRODAFT Cyber Security Technologies INC"
}
],
"cve": "CVE-2022-29154",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-07-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2110928"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in rsync that is triggered by a victim rsync user/client connecting to a malicious rsync server. The server can copy and overwrite arbitrary files in the client\u0027s rsync target directory and subdirectories. This flaw allows a malicious server, or in some cases, another attacker who performs a man-in-the-middle attack, to potentially overwrite sensitive files on the client machine, resulting in further exploitation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsync: remote arbitrary files write inside the directories of connecting peers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29154"
},
{
"category": "external",
"summary": "RHBZ#2110928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29154"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/08/02/1",
"url": "https://www.openwall.com/lists/oss-security/2022/08/02/1"
}
],
"release_date": "2022-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "workaround",
"details": "Only connecting to trusted Rsync servers over trusted channels would help to mitigate this flaw.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "rsync: remote arbitrary files write inside the directories of connecting peers"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022_5819
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Softirq hrtimers are being placed on the per-CPU softirq clocks on isolcpu\u2019s. (BZ#2090484)\n\n* enable/disable multiqueues repeatedly while ping local host, guest kernel panic (BZ#2093416)\n\n* Backport kernel audit enhancements and fixes from v5.13-rc1 to v5.16-rc6 (BZ#2095434)\n\n* blk_update_request: I/O error, dev nvme0n3, during xfs creation (BZ#2100150)\n\n* SCSI updates for RHEL 8.7 (BZ#2100254)\n\n* Kernel bug on mm/slub.c:314 (BZ#2102251)\n\n* Implement new tc action for check_pkt_len (BZ#2102333)\n\n* too long timeout value with TIME_WAIT status of conntrack entry (BZ#2104002)\n\n* Connectx6-DX, mlx5 , backport 087032ee7021 (\"net/mlx5e: TC, Fix ct_clear overwriting ct action metadata\") (BZ#2104012)\n\n* mlx5: Software steering memory allocation failure, netperf TCP_CRR with ct(). (BZ#2104013)\n\n* tcp: request_sock leak in Calico OCP (BZ#2104670)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5819",
"url": "https://access.redhat.com/errata/RHSA-2022:5819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5819.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T14:55:19+00:00",
"generator": {
"date": "2024-11-15T14:55:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:5819",
"initial_release_date": "2022-08-03T12:51:35+00:00",
"revision_history": [
{
"date": "2022-08-03T12:51:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-08-03T12:51:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:55:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.19.1.el8_6.src",
"product": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.src",
"product_id": "kernel-0:4.18.0-372.19.1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.19.1.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-372.19.1.el8_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"product_id": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.19.1.el8_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.src",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-08-03T12:51:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5819"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-08-03T12:51:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5819"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
RHSA-2022:5636
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Backport request of \"genirq: use rcu in kstat_irqs_usr()\" (BZ#2083311)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5636",
"url": "https://access.redhat.com/errata/RHSA-2022:5636"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5636.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:53:21+00:00",
"generator": {
"date": "2025-10-09T21:53:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5636",
"initial_release_date": "2022-07-19T15:31:52+00:00",
"revision_history": [
{
"date": "2022-07-19T15:31:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-07-19T15:31:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:53:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.70.1.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.src",
"product_id": "kernel-0:4.18.0-147.70.1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.70.1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.70.1.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.70.1.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.70.1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.70.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T15:31:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T15:31:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T15:31:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5636"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022:6551
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nThe following packages have been upgraded to a later upstream version: redhat-release-virtualization-host (4.5.2), redhat-virtualization-host (4.5.2), redhat-virtualization-host-productimg (4.5.2). (BZ#2070049, BZ#2093195)\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132)\n\n* systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c (CVE-2022-2526)\n\n* kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)\n\n* rsync: remote arbitrary files write inside the directories of connecting peers (CVE-2022-29154)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:6551",
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "2099475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099475"
},
{
"category": "external",
"summary": "2107498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107498"
},
{
"category": "external",
"summary": "2109393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109393"
},
{
"category": "external",
"summary": "2109926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109926"
},
{
"category": "external",
"summary": "2110928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110928"
},
{
"category": "external",
"summary": "2114849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114849"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6551.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization security update",
"tracking": {
"current_release_date": "2025-10-09T22:12:20+00:00",
"generator": {
"date": "2025-10-09T22:12:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:6551",
"initial_release_date": "2022-09-19T11:53:21+00:00",
"revision_history": [
{
"date": "2022-09-19T11:53:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-09-19T11:53:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:12:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.2-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"product_id": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.2-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"product": {
"name": "redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"product_id": "redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.5.2-202209140405_8.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.2-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.5.2-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64",
"product_id": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.5.2-202209140405_8.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.5.2-1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.5.2-202209140405_8.6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src"
},
"product_reference": "redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Cong Wang"
],
"organization": "China Telecom"
}
],
"cve": "CVE-2022-2132",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-06-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2099475"
}
],
"notes": [
{
"category": "description",
"text": "A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Container Platform (OCP) the openvswitch rpm package is consumed from the RHEL Fast Datapath repositories, hence OCP openvswitch components are marked as \"Will not fix\".",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2132"
},
{
"category": "external",
"summary": "RHBZ#2099475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2132"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2132",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2132"
},
{
"category": "external",
"summary": "https://bugs.dpdk.org/show_bug.cgi?id=1031",
"url": "https://bugs.dpdk.org/show_bug.cgi?id=1031"
}
],
"release_date": "2022-08-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs"
},
{
"acknowledgments": [
{
"names": [
"Siddharth Sharma"
],
"organization": "Red Hat Product Security",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2022-2526",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-07-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2109926"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in \u0027resolved-dns-stream.c\u0027 not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as important because this flaw can easily compromise the confidentiality, integrity, or availability of resources but that allows local or authenticated users to gain additional privileges, allow unauthenticated remote users to view resources that should otherwise be protected by authentication or other controls, allow authenticated remote users to execute arbitrary code, or allow remote users to cause a denial of service. But this flaw does not easily exploit by a remote unauthenticated attacker.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2526"
},
{
"category": "external",
"summary": "RHBZ#2109926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109926"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2526"
}
],
"release_date": "2022-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c"
},
{
"acknowledgments": [
{
"names": [
"Zhenpeng Lin"
]
}
],
"cve": "CVE-2022-2588",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-08-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2114849"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in route4_change in the net/sched/cls_route.c filter implementation in the Linux kernel. This flaw allows a local user to crash the system and possibly lead to a local privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2588"
},
{
"category": "external",
"summary": "RHBZ#2114849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114849"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2588"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u",
"url": "https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u"
}
],
"release_date": "2022-08-09T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Ege BALCI"
],
"organization": "PRODAFT Cyber Security Technologies INC"
}
],
"cve": "CVE-2022-29154",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-07-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2110928"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in rsync that is triggered by a victim rsync user/client connecting to a malicious rsync server. The server can copy and overwrite arbitrary files in the client\u0027s rsync target directory and subdirectories. This flaw allows a malicious server, or in some cases, another attacker who performs a man-in-the-middle attack, to potentially overwrite sensitive files on the client machine, resulting in further exploitation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsync: remote arbitrary files write inside the directories of connecting peers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29154"
},
{
"category": "external",
"summary": "RHBZ#2110928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29154"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/08/02/1",
"url": "https://www.openwall.com/lists/oss-security/2022/08/02/1"
}
],
"release_date": "2022-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "workaround",
"details": "Only connecting to trusted Rsync servers over trusted channels would help to mitigate this flaw.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "rsync: remote arbitrary files write inside the directories of connecting peers"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022_5633
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z10 source tree (BZ#2087922)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5633",
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5633.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T14:54:45+00:00",
"generator": {
"date": "2024-11-15T14:54:45+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:5633",
"initial_release_date": "2022-07-19T21:09:22+00:00",
"revision_history": [
{
"date": "2022-07-19T21:09:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-07-19T21:09:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:54:45+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.57.1.rt7.129.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2021-4197",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-12-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035652"
}
],
"notes": [
{
"category": "description",
"text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4197"
},
{
"category": "external",
"summary": "RHBZ#2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/",
"url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"
}
],
"release_date": "2021-09-12T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks"
},
{
"cve": "CVE-2021-4203",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2036934"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "RHBZ#2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/",
"url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"
}
],
"release_date": "2021-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses"
},
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022_5834
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* The latest RHEL 8.6.z2 kernel changes need to be merged into the RT source tree to keep source parity between the two kernels. (BZ#2107215)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5834",
"url": "https://access.redhat.com/errata/RHSA-2022:5834"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5834.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T14:54:40+00:00",
"generator": {
"date": "2024-11-15T14:54:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:5834",
"initial_release_date": "2022-08-02T08:17:16+00:00",
"revision_history": [
{
"date": "2022-08-02T08:17:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-08-02T08:17:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:54:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"product": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"product_id": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.19.1.rt7.176.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-08-02T08:17:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5834"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-08-02T08:17:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5834"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022:5819
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Softirq hrtimers are being placed on the per-CPU softirq clocks on isolcpu\u2019s. (BZ#2090484)\n\n* enable/disable multiqueues repeatedly while ping local host, guest kernel panic (BZ#2093416)\n\n* Backport kernel audit enhancements and fixes from v5.13-rc1 to v5.16-rc6 (BZ#2095434)\n\n* blk_update_request: I/O error, dev nvme0n3, during xfs creation (BZ#2100150)\n\n* SCSI updates for RHEL 8.7 (BZ#2100254)\n\n* Kernel bug on mm/slub.c:314 (BZ#2102251)\n\n* Implement new tc action for check_pkt_len (BZ#2102333)\n\n* too long timeout value with TIME_WAIT status of conntrack entry (BZ#2104002)\n\n* Connectx6-DX, mlx5 , backport 087032ee7021 (\"net/mlx5e: TC, Fix ct_clear overwriting ct action metadata\") (BZ#2104012)\n\n* mlx5: Software steering memory allocation failure, netperf TCP_CRR with ct(). (BZ#2104013)\n\n* tcp: request_sock leak in Calico OCP (BZ#2104670)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5819",
"url": "https://access.redhat.com/errata/RHSA-2022:5819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5819.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:12:19+00:00",
"generator": {
"date": "2025-10-09T22:12:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5819",
"initial_release_date": "2022-08-03T12:51:35+00:00",
"revision_history": [
{
"date": "2022-08-03T12:51:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-08-03T12:51:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:12:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.19.1.el8_6.src",
"product": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.src",
"product_id": "kernel-0:4.18.0-372.19.1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.19.1.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-372.19.1.el8_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"product_id": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.19.1.el8_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.src",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-08-03T12:51:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5819"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-08-03T12:51:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5819"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
},
{
"cve": "CVE-2022-49541",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348119"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix potential double free during failed mount\n\nRHBZ: https://bugzilla.redhat.com/show_bug.cgi?id=2088799",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cifs: fix potential double free during failed mount",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw results from a missing check in the kernel\u0027s CIFS mounting code which can lead to the same pointer being freed twice when there is an error mounting the volume. An attacker could exploit this vulnerability to corrupt or alter system memory or execute arbitrary code with elevated privileges.\nNote that this vulnerability was fixed in previous errata:\nRHSA-2022:5819 for Red Hat Enterprise Linux 8.6 EUS\nRHSA-2022:7683 for Red Hat Enterprise Linux 8.7-8.10\nRHSA-2023:2458 for Red Hat Enterprise Linux 9.2 and later.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49541"
},
{
"category": "external",
"summary": "RHBZ#2348119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348119"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49541"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49541-7460@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49541-7460@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-08-03T12:51:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5819"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cifs: fix potential double free during failed mount"
}
]
}
RHSA-2022:5214
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5214",
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5214.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:12:18+00:00",
"generator": {
"date": "2025-10-09T22:12:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5214",
"initial_release_date": "2022-06-28T06:58:01+00:00",
"revision_history": [
{
"date": "2022-06-28T06:58:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-06-28T06:58:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:12:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-1.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-1.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T06:58:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"cve": "CVE-2022-1966",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2093146"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel\u0027s netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2022-32250. Note: All CVE users should reference CVE-2022-32250 instead of this candidate.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "RHBZ#2093146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T06:58:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
}
],
"title": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)"
},
{
"cve": "CVE-2022-27666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061633"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in IPsec ESP transformation code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27666"
},
{
"category": "external",
"summary": "RHBZ#2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"url": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645"
}
],
"release_date": "2022-03-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T06:58:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
},
{
"category": "workaround",
"details": "The given exploit needs CAP_NET_ADMIN to set up IPsec SA and a user namespace is used to get that capability, so disabling unprivileged user namespaces gives some protection.\n~~~\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n~~~\nNote: If the target system is already using IPsec and has SA configured, then no additional privileges are needed to exploit the issue.",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: buffer overflow in IPsec ESP transformation code"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T06:58:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022:5633
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z10 source tree (BZ#2087922)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5633",
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5633.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:27:40+00:00",
"generator": {
"date": "2025-10-09T20:27:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5633",
"initial_release_date": "2022-07-19T21:09:22+00:00",
"revision_history": [
{
"date": "2022-07-19T21:09:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-07-19T21:09:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:27:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.57.1.rt7.129.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2021-4197",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-12-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035652"
}
],
"notes": [
{
"category": "description",
"text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4197"
},
{
"category": "external",
"summary": "RHBZ#2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/",
"url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"
}
],
"release_date": "2021-09-12T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks"
},
{
"cve": "CVE-2021-4203",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2036934"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "RHBZ#2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/",
"url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"
}
],
"release_date": "2021-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses"
},
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
RHSA-2022:5819
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Softirq hrtimers are being placed on the per-CPU softirq clocks on isolcpu\u2019s. (BZ#2090484)\n\n* enable/disable multiqueues repeatedly while ping local host, guest kernel panic (BZ#2093416)\n\n* Backport kernel audit enhancements and fixes from v5.13-rc1 to v5.16-rc6 (BZ#2095434)\n\n* blk_update_request: I/O error, dev nvme0n3, during xfs creation (BZ#2100150)\n\n* SCSI updates for RHEL 8.7 (BZ#2100254)\n\n* Kernel bug on mm/slub.c:314 (BZ#2102251)\n\n* Implement new tc action for check_pkt_len (BZ#2102333)\n\n* too long timeout value with TIME_WAIT status of conntrack entry (BZ#2104002)\n\n* Connectx6-DX, mlx5 , backport 087032ee7021 (\"net/mlx5e: TC, Fix ct_clear overwriting ct action metadata\") (BZ#2104012)\n\n* mlx5: Software steering memory allocation failure, netperf TCP_CRR with ct(). (BZ#2104013)\n\n* tcp: request_sock leak in Calico OCP (BZ#2104670)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5819",
"url": "https://access.redhat.com/errata/RHSA-2022:5819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5819.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:12:19+00:00",
"generator": {
"date": "2025-10-09T22:12:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5819",
"initial_release_date": "2022-08-03T12:51:35+00:00",
"revision_history": [
{
"date": "2022-08-03T12:51:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-08-03T12:51:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:12:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.19.1.el8_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.19.1.el8_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.19.1.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.19.1.el8_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.19.1.el8_6.src",
"product": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.src",
"product_id": "kernel-0:4.18.0-372.19.1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.19.1.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-372.19.1.el8_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"product_id": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.19.1.el8_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.src",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"relates_to_product_reference": "CRB-8.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-08-03T12:51:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5819"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-08-03T12:51:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5819"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
},
{
"cve": "CVE-2022-49541",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2348119"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix potential double free during failed mount\n\nRHBZ: https://bugzilla.redhat.com/show_bug.cgi?id=2088799",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cifs: fix potential double free during failed mount",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw results from a missing check in the kernel\u0027s CIFS mounting code which can lead to the same pointer being freed twice when there is an error mounting the volume. An attacker could exploit this vulnerability to corrupt or alter system memory or execute arbitrary code with elevated privileges.\nNote that this vulnerability was fixed in previous errata:\nRHSA-2022:5819 for Red Hat Enterprise Linux 8.6 EUS\nRHSA-2022:7683 for Red Hat Enterprise Linux 8.7-8.10\nRHSA-2023:2458 for Red Hat Enterprise Linux 9.2 and later.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49541"
},
{
"category": "external",
"summary": "RHBZ#2348119",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2348119"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49541"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49541-7460@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49541-7460@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-08-03T12:51:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5819"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.src",
"8Base-RHV-Hypervisor-4:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"8Base-RHV-Hypervisor-4:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"BaseOS-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.src",
"CRB-8.6.0.Z.MAIN.EUS:kernel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-abi-stablelists-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-372.19.1.el8_6.noarch",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-0:4.18.0-372.19.1.el8_6.x86_64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.aarch64",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.ppc64le",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.s390x",
"CRB-8.6.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-372.19.1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: cifs: fix potential double free during failed mount"
}
]
}
rhsa-2022:5636
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Backport request of \"genirq: use rcu in kstat_irqs_usr()\" (BZ#2083311)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5636",
"url": "https://access.redhat.com/errata/RHSA-2022:5636"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5636.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:53:21+00:00",
"generator": {
"date": "2025-10-09T21:53:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5636",
"initial_release_date": "2022-07-19T15:31:52+00:00",
"revision_history": [
{
"date": "2022-07-19T15:31:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-07-19T15:31:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:53:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.70.1.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.src",
"product_id": "kernel-0:4.18.0-147.70.1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.70.1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.70.1.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.70.1.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.70.1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.70.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T15:31:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T15:31:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T15:31:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5636"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022:5214
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5214",
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5214.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T22:12:18+00:00",
"generator": {
"date": "2025-10-09T22:12:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5214",
"initial_release_date": "2022-06-28T06:58:01+00:00",
"revision_history": [
{
"date": "2022-06-28T06:58:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-06-28T06:58:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:12:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-1.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-1.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T06:58:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"cve": "CVE-2022-1966",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2093146"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel\u0027s netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2022-32250. Note: All CVE users should reference CVE-2022-32250 instead of this candidate.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "RHBZ#2093146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T06:58:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
}
],
"title": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)"
},
{
"cve": "CVE-2022-27666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061633"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in IPsec ESP transformation code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27666"
},
{
"category": "external",
"summary": "RHBZ#2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"url": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645"
}
],
"release_date": "2022-03-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T06:58:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
},
{
"category": "workaround",
"details": "The given exploit needs CAP_NET_ADMIN to set up IPsec SA and a user namespace is used to get that capability, so disabling unprivileged user namespaces gives some protection.\n~~~\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n~~~\nNote: If the target system is already using IPsec and has SA configured, then no additional privileges are needed to exploit the issue.",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: buffer overflow in IPsec ESP transformation code"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T06:58:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022_5220
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* slub corruption during LPM of hnv interface (BZ#2081252)\n\n* sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35 (BZ#2082090)\n\n* Backport request of \"genirq: use rcu in kstat_irqs_usr()\" (BZ#2083310)\n\n* kernel memory leak while freeing nested actions (BZ#2086604)\n\n* dm: sync rhel-8.6 with upstream 5.13 through 5.16 fixes and improvements (BZ#2088036)\n\n* NFS processing deadlock in low memory condition (BZ#2094459)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5220",
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5220.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-12-02T07:51:52+00:00",
"generator": {
"date": "2024-12-02T07:51:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:5220",
"initial_release_date": "2022-06-28T12:32:10+00:00",
"revision_history": [
{
"date": "2022-06-28T12:32:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-06-28T12:32:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-02T07:51:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.87.1.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.src",
"product_id": "kernel-0:4.18.0-193.87.1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.87.1.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.87.1.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2021-47435",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: fix mempool NULL pointer race when completing IO",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "RHBZ#2282879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: fix mempool NULL pointer race when completing IO"
},
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-1966",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2093146"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel\u0027s netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2022-32250. Note: All CVE users should reference CVE-2022-32250 instead of this candidate.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "RHBZ#2093146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
}
],
"title": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)"
},
{
"cve": "CVE-2022-27666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061633"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in IPsec ESP transformation code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27666"
},
{
"category": "external",
"summary": "RHBZ#2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"url": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645"
}
],
"release_date": "2022-03-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "workaround",
"details": "The given exploit needs CAP_NET_ADMIN to set up IPsec SA and a user namespace is used to get that capability, so disabling unprivileged user namespaces gives some protection.\n~~~\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n~~~\nNote: If the target system is already using IPsec and has SA configured, then no additional privileges are needed to exploit the issue.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: buffer overflow in IPsec ESP transformation code"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
RHSA-2022:5224
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z18 Batch (BZ#2081080)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5224",
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5224.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:27:39+00:00",
"generator": {
"date": "2025-10-09T20:27:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5224",
"initial_release_date": "2022-06-28T07:55:15+00:00",
"revision_history": [
{
"date": "2022-06-28T07:55:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-06-28T07:55:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:27:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.87.1.rt13.137.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-1966",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2093146"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel\u0027s netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2022-32250. Note: All CVE users should reference CVE-2022-32250 instead of this candidate.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "RHBZ#2093146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
}
],
"title": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)"
},
{
"cve": "CVE-2022-27666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061633"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in IPsec ESP transformation code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27666"
},
{
"category": "external",
"summary": "RHBZ#2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"url": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645"
}
],
"release_date": "2022-03-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "workaround",
"details": "The given exploit needs CAP_NET_ADMIN to set up IPsec SA and a user namespace is used to get that capability, so disabling unprivileged user namespaces gives some protection.\n~~~\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n~~~\nNote: If the target system is already using IPsec and has SA configured, then no additional privileges are needed to exploit the issue.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: buffer overflow in IPsec ESP transformation code"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022_5626
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Failed to reboot after crash trigger (BZ#2060747)\n\n* conntrack entries linger around after test (BZ#2066357)\n\n* Enable nested virtualization (BZ#2079070)\n\n* slub corruption during LPM of hnv interface (BZ#2081251)\n\n* sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35 (BZ#2082091)\n\n* Backport request of \"genirq: use rcu in kstat_irqs_usr()\" (BZ#2083309)\n\n* ethtool -L may cause system to hang (BZ#2083323)\n\n* For isolated CPUs (with nohz_full enabled for isolated CPUs) CPU utilization statistics are not getting reflected continuously (BZ#2084139)\n\n* Affinity broken due to vector space exhaustion (BZ#2084647)\n\n* kernel memory leak while freeing nested actions (BZ#2086597)\n\n* sync rhel-8.6 with upstream 5.13 through 5.16 fixes and improvements (BZ#2088037)\n\n* Kernel panic possibly when cleaning namespace on pod deletion (BZ#2089539)\n\n* Softirq hrtimers are being placed on the per-CPU softirq clocks on isolcpu\u2019s. (BZ#2090485)\n\n* fix missed wake-ups in rq_qos_throttle try two (BZ#2092076)\n\n* NFS4 client experiencing IO outages while sending duplicate SYNs and erroneous RSTs during connection reestablishment (BZ#2094334)\n\n* using __this_cpu_read() in preemptible [00000000] code: kworker/u66:1/937154 (BZ#2095775)\n\n* Need some changes in RHEL8.x kernels. (BZ#2096932)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5626",
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5626.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T14:54:52+00:00",
"generator": {
"date": "2024-11-15T14:54:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:5626",
"initial_release_date": "2022-07-19T21:14:02+00:00",
"revision_history": [
{
"date": "2022-07-19T21:14:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-07-19T21:14:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:54:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.57.1.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.src",
"product_id": "kernel-0:4.18.0-305.57.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.57.1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.57.1.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.57.1.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.src as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2021-4197",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-12-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035652"
}
],
"notes": [
{
"category": "description",
"text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4197"
},
{
"category": "external",
"summary": "RHBZ#2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/",
"url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"
}
],
"release_date": "2021-09-12T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks"
},
{
"cve": "CVE-2021-4203",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2036934"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "RHBZ#2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/",
"url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"
}
],
"release_date": "2021-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses"
},
{
"cve": "CVE-2021-47435",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: fix mempool NULL pointer race when completing IO",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "RHBZ#2282879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: fix mempool NULL pointer race when completing IO"
},
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022:5267
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-9.0.z1 Batch (BZ#2089492)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5267",
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.0_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.0_release_notes/index"
},
{
"category": "external",
"summary": "2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5267.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:53:19+00:00",
"generator": {
"date": "2025-10-09T21:53:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5267",
"initial_release_date": "2022-06-28T10:45:21+00:00",
"revision_history": [
{
"date": "2022-06-28T10:45:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-06-28T10:45:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:53:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"product": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"product_id": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.17.1.rt21.89.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src"
},
"product_reference": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src"
},
"product_reference": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T10:45:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T10:45:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-1966",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2093146"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel\u0027s netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2022-32250. Note: All CVE users should reference CVE-2022-32250 instead of this candidate.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "RHBZ#2093146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T10:45:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
}
],
"title": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)"
},
{
"cve": "CVE-2022-27666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061633"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in IPsec ESP transformation code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27666"
},
{
"category": "external",
"summary": "RHBZ#2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"url": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645"
}
],
"release_date": "2022-03-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T10:45:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "workaround",
"details": "The given exploit needs CAP_NET_ADMIN to set up IPsec SA and a user namespace is used to get that capability, so disabling unprivileged user namespaces gives some protection.\n~~~\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n~~~\nNote: If the target system is already using IPsec and has SA configured, then no additional privileges are needed to exploit the issue.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: buffer overflow in IPsec ESP transformation code"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T10:45:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022_6551
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host, redhat-virtualization-host, and redhat-virtualization-host-productimg is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nThe following packages have been upgraded to a later upstream version: redhat-release-virtualization-host (4.5.2), redhat-virtualization-host (4.5.2), redhat-virtualization-host-productimg (4.5.2). (BZ#2070049, BZ#2093195)\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs (CVE-2022-2132)\n\n* systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c (CVE-2022-2526)\n\n* kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation (CVE-2022-2588)\n\n* rsync: remote arbitrary files write inside the directories of connecting peers (CVE-2022-29154)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:6551",
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "2099475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099475"
},
{
"category": "external",
"summary": "2107498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107498"
},
{
"category": "external",
"summary": "2109393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109393"
},
{
"category": "external",
"summary": "2109926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109926"
},
{
"category": "external",
"summary": "2110928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110928"
},
{
"category": "external",
"summary": "2114849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114849"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6551.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Virtualization security update",
"tracking": {
"current_release_date": "2024-11-22T19:52:30+00:00",
"generator": {
"date": "2024-11-22T19:52:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:6551",
"initial_release_date": "2022-09-19T11:53:21+00:00",
"revision_history": [
{
"date": "2022-09-19T11:53:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-09-19T11:53:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T19:52:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhev_hypervisor:4.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"product_id": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.2-1.el8ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"product_id": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.2-1.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"product": {
"name": "redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"product_id": "redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.5.2-202209140405_8.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.5.2-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"product_id": "redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.5.2-1.el8ev?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64",
"product": {
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64",
"product_id": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-productimg@4.5.2-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"product_id": "redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.5.2-202209140405_8.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.5.2-1.el8ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.5.2-202209140405_8.6.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src"
},
"product_reference": "redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64 as a component of Red Hat Virtualization 4 Hypervisor for RHEL 8",
"product_id": "8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"relates_to_product_reference": "8Base-RHV-Hypervisor-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.src as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64 as a component of RHEL 8-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
},
"product_reference": "redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64",
"relates_to_product_reference": "8Base-RHV-HypervisorBuild-4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Cong Wang"
],
"organization": "China Telecom"
}
],
"cve": "CVE-2022-2132",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-06-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2099475"
}
],
"notes": [
{
"category": "description",
"text": "A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Container Platform (OCP) the openvswitch rpm package is consumed from the RHEL Fast Datapath repositories, hence OCP openvswitch components are marked as \"Will not fix\".",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2132"
},
{
"category": "external",
"summary": "RHBZ#2099475",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099475"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2132"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2132",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2132"
},
{
"category": "external",
"summary": "https://bugs.dpdk.org/show_bug.cgi?id=1031",
"url": "https://bugs.dpdk.org/show_bug.cgi?id=1031"
}
],
"release_date": "2022-08-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs"
},
{
"acknowledgments": [
{
"names": [
"Siddharth Sharma"
],
"organization": "Red Hat Product Security",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2022-2526",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-07-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2109926"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in systemd. This issue occurs due to the on_stream_io() function and dns_stream_complete() function in \u0027resolved-dns-stream.c\u0027 not incrementing the reference counting for the DnsStream object. Therefore, other functions and callbacks called can dereference the DNSStream object, causing the use-after-free when the reference is still used later.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as important because this flaw can easily compromise the confidentiality, integrity, or availability of resources but that allows local or authenticated users to gain additional privileges, allow unauthenticated remote users to view resources that should otherwise be protected by authentication or other controls, allow authenticated remote users to execute arbitrary code, or allow remote users to cause a denial of service. But this flaw does not easily exploit by a remote unauthenticated attacker.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2526"
},
{
"category": "external",
"summary": "RHBZ#2109926",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109926"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2526"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2526",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2526"
}
],
"release_date": "2022-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c"
},
{
"acknowledgments": [
{
"names": [
"Zhenpeng Lin"
]
}
],
"cve": "CVE-2022-2588",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-08-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2114849"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in route4_change in the net/sched/cls_route.c filter implementation in the Linux kernel. This flaw allows a local user to crash the system and possibly lead to a local privilege escalation problem.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2588"
},
{
"category": "external",
"summary": "RHBZ#2114849",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114849"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2588",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2588"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u",
"url": "https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u"
}
],
"release_date": "2022-08-09T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation"
},
{
"acknowledgments": [
{
"names": [
"Ege BALCI"
],
"organization": "PRODAFT Cyber Security Technologies INC"
}
],
"cve": "CVE-2022-29154",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-07-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2110928"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in rsync that is triggered by a victim rsync user/client connecting to a malicious rsync server. The server can copy and overwrite arbitrary files in the client\u0027s rsync target directory and subdirectories. This flaw allows a malicious server, or in some cases, another attacker who performs a man-in-the-middle attack, to potentially overwrite sensitive files on the client machine, resulting in further exploitation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rsync: remote arbitrary files write inside the directories of connecting peers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-29154"
},
{
"category": "external",
"summary": "RHBZ#2110928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29154"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/08/02/1",
"url": "https://www.openwall.com/lists/oss-security/2022/08/02/1"
}
],
"release_date": "2022-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "workaround",
"details": "Only connecting to trusted Rsync servers over trusted channels would help to mitigate this flaw.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "rsync: remote arbitrary files write inside the directories of connecting peers"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"known_not_affected": [
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-09-19T11:53:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.src",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-release-virtualization-host-content-0:4.5.2-1.el8ev.x86_64",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-image-update-placeholder-0:4.5.2-1.el8ev.noarch",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.src",
"8Base-RHV-HypervisorBuild-4:redhat-virtualization-host-productimg-0:4.5.2-1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-0:4.5.2-202209140405_8.6.src",
"8Base-RHV-Hypervisor-4:redhat-virtualization-host-image-update-0:4.5.2-202209140405_8.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022:5834
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* The latest RHEL 8.6.z2 kernel changes need to be merged into the RT source tree to keep source parity between the two kernels. (BZ#2107215)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5834",
"url": "https://access.redhat.com/errata/RHSA-2022:5834"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5834.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:12:19+00:00",
"generator": {
"date": "2025-10-09T22:12:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5834",
"initial_release_date": "2022-08-02T08:17:16+00:00",
"revision_history": [
{
"date": "2022-08-02T08:17:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-08-02T08:17:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:12:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"product": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"product_id": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.19.1.rt7.176.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-08-02T08:17:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5834"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-08-02T08:17:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5834"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022_5214
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5214",
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5214.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-12-02T07:51:18+00:00",
"generator": {
"date": "2024-12-02T07:51:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:5214",
"initial_release_date": "2022-06-28T06:58:01+00:00",
"revision_history": [
{
"date": "2022-06-28T06:58:01+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-06-28T06:58:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-02T07:51:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-1.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1@1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debugsource@1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"product": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"product_id": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-5_14_0-70_13_1-debuginfo@1-1.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
},
"product_reference": "kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T06:58:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"cve": "CVE-2022-1966",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2093146"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel\u0027s netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2022-32250. Note: All CVE users should reference CVE-2022-32250 instead of this candidate.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "RHBZ#2093146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T06:58:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
}
],
"title": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)"
},
{
"cve": "CVE-2022-27666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061633"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in IPsec ESP transformation code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27666"
},
{
"category": "external",
"summary": "RHBZ#2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"url": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645"
}
],
"release_date": "2022-03-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T06:58:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
},
{
"category": "workaround",
"details": "The given exploit needs CAP_NET_ADMIN to set up IPsec SA and a user namespace is used to get that capability, so disabling unprivileged user namespaces gives some protection.\n~~~\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n~~~\nNote: If the target system is already using IPsec and has SA configured, then no additional privileges are needed to exploit the issue.",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: buffer overflow in IPsec ESP transformation code"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T06:58:01+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debuginfo-0:1-1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kpatch-patch-5_14_0-70_13_1-debugsource-0:1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022:5626
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Failed to reboot after crash trigger (BZ#2060747)\n\n* conntrack entries linger around after test (BZ#2066357)\n\n* Enable nested virtualization (BZ#2079070)\n\n* slub corruption during LPM of hnv interface (BZ#2081251)\n\n* sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35 (BZ#2082091)\n\n* Backport request of \"genirq: use rcu in kstat_irqs_usr()\" (BZ#2083309)\n\n* ethtool -L may cause system to hang (BZ#2083323)\n\n* For isolated CPUs (with nohz_full enabled for isolated CPUs) CPU utilization statistics are not getting reflected continuously (BZ#2084139)\n\n* Affinity broken due to vector space exhaustion (BZ#2084647)\n\n* kernel memory leak while freeing nested actions (BZ#2086597)\n\n* sync rhel-8.6 with upstream 5.13 through 5.16 fixes and improvements (BZ#2088037)\n\n* Kernel panic possibly when cleaning namespace on pod deletion (BZ#2089539)\n\n* Softirq hrtimers are being placed on the per-CPU softirq clocks on isolcpu\u2019s. (BZ#2090485)\n\n* fix missed wake-ups in rq_qos_throttle try two (BZ#2092076)\n\n* NFS4 client experiencing IO outages while sending duplicate SYNs and erroneous RSTs during connection reestablishment (BZ#2094334)\n\n* using __this_cpu_read() in preemptible [00000000] code: kworker/u66:1/937154 (BZ#2095775)\n\n* Need some changes in RHEL8.x kernels. (BZ#2096932)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5626",
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5626.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:27:40+00:00",
"generator": {
"date": "2025-10-09T20:27:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5626",
"initial_release_date": "2022-07-19T21:14:02+00:00",
"revision_history": [
{
"date": "2022-07-19T21:14:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-07-19T21:14:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:27:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.57.1.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.src",
"product_id": "kernel-0:4.18.0-305.57.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.57.1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.57.1.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.57.1.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.src as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2021-4197",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-12-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035652"
}
],
"notes": [
{
"category": "description",
"text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4197"
},
{
"category": "external",
"summary": "RHBZ#2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/",
"url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"
}
],
"release_date": "2021-09-12T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks"
},
{
"cve": "CVE-2021-4203",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2036934"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "RHBZ#2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/",
"url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"
}
],
"release_date": "2021-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses"
},
{
"cve": "CVE-2021-47435",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: fix mempool NULL pointer race when completing IO",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "RHBZ#2282879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: fix mempool NULL pointer race when completing IO"
},
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
},
{
"cve": "CVE-2022-49086",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347770"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open vSwitch module in the Linux kernel. Improper handling of allocated memory can lead to a memory leak, potentially impacting system performance and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: openvswitch: fix leak of nested actions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.4, 8.7, 9.0 and 9.1 via RHSA-2022:5626 [1], RHSA-2022:7683 [2], RHSA-2022:8973 [3] and RHSA-2022:8267 [4], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2022:5626\n\n[2]. https://access.redhat.com/errata/RHSA-2022:7683\n\n[3]. https://access.redhat.com/errata/RHSA-2022:8973\n\n[4]. https://access.redhat.com/errata/RHSA-2022:8267",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49086"
},
{
"category": "external",
"summary": "RHBZ#2347770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347770"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49086"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2022-49086-a289@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2022-49086-a289@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: openvswitch: fix leak of nested actions"
}
]
}
rhsa-2022_5267
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-9.0.z1 Batch (BZ#2089492)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5267",
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.0_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.0_release_notes/index"
},
{
"category": "external",
"summary": "2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5267.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-12-02T07:51:26+00:00",
"generator": {
"date": "2024-12-02T07:51:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:5267",
"initial_release_date": "2022-06-28T10:45:21+00:00",
"revision_history": [
{
"date": "2022-06-28T10:45:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-06-28T10:45:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-02T07:51:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"product": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"product_id": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.17.1.rt21.89.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src"
},
"product_reference": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src"
},
"product_reference": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T10:45:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T10:45:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-1966",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2093146"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel\u0027s netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2022-32250. Note: All CVE users should reference CVE-2022-32250 instead of this candidate.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "RHBZ#2093146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T10:45:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
}
],
"title": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)"
},
{
"cve": "CVE-2022-27666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061633"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in IPsec ESP transformation code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27666"
},
{
"category": "external",
"summary": "RHBZ#2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"url": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645"
}
],
"release_date": "2022-03-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T10:45:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "workaround",
"details": "The given exploit needs CAP_NET_ADMIN to set up IPsec SA and a user namespace is used to get that capability, so disabling unprivileged user namespaces gives some protection.\n~~~\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n~~~\nNote: If the target system is already using IPsec and has SA configured, then no additional privileges are needed to exploit the issue.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: buffer overflow in IPsec ESP transformation code"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T10:45:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
RHSA-2022:5220
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* slub corruption during LPM of hnv interface (BZ#2081252)\n\n* sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35 (BZ#2082090)\n\n* Backport request of \"genirq: use rcu in kstat_irqs_usr()\" (BZ#2083310)\n\n* kernel memory leak while freeing nested actions (BZ#2086604)\n\n* dm: sync rhel-8.6 with upstream 5.13 through 5.16 fixes and improvements (BZ#2088036)\n\n* NFS processing deadlock in low memory condition (BZ#2094459)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5220",
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5220.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:27:39+00:00",
"generator": {
"date": "2025-10-09T20:27:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5220",
"initial_release_date": "2022-06-28T12:32:10+00:00",
"revision_history": [
{
"date": "2022-06-28T12:32:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-06-28T12:32:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:27:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.87.1.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.src",
"product_id": "kernel-0:4.18.0-193.87.1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.87.1.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.87.1.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2021-47435",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: fix mempool NULL pointer race when completing IO",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "RHBZ#2282879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: fix mempool NULL pointer race when completing IO"
},
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-1966",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2093146"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel\u0027s netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2022-32250. Note: All CVE users should reference CVE-2022-32250 instead of this candidate.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "RHBZ#2093146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
}
],
"title": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)"
},
{
"cve": "CVE-2022-27666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061633"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in IPsec ESP transformation code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27666"
},
{
"category": "external",
"summary": "RHBZ#2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"url": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645"
}
],
"release_date": "2022-03-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "workaround",
"details": "The given exploit needs CAP_NET_ADMIN to set up IPsec SA and a user namespace is used to get that capability, so disabling unprivileged user namespaces gives some protection.\n~~~\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n~~~\nNote: If the target system is already using IPsec and has SA configured, then no additional privileges are needed to exploit the issue.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: buffer overflow in IPsec ESP transformation code"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
RHSA-2022:5626
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Failed to reboot after crash trigger (BZ#2060747)\n\n* conntrack entries linger around after test (BZ#2066357)\n\n* Enable nested virtualization (BZ#2079070)\n\n* slub corruption during LPM of hnv interface (BZ#2081251)\n\n* sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35 (BZ#2082091)\n\n* Backport request of \"genirq: use rcu in kstat_irqs_usr()\" (BZ#2083309)\n\n* ethtool -L may cause system to hang (BZ#2083323)\n\n* For isolated CPUs (with nohz_full enabled for isolated CPUs) CPU utilization statistics are not getting reflected continuously (BZ#2084139)\n\n* Affinity broken due to vector space exhaustion (BZ#2084647)\n\n* kernel memory leak while freeing nested actions (BZ#2086597)\n\n* sync rhel-8.6 with upstream 5.13 through 5.16 fixes and improvements (BZ#2088037)\n\n* Kernel panic possibly when cleaning namespace on pod deletion (BZ#2089539)\n\n* Softirq hrtimers are being placed on the per-CPU softirq clocks on isolcpu\u2019s. (BZ#2090485)\n\n* fix missed wake-ups in rq_qos_throttle try two (BZ#2092076)\n\n* NFS4 client experiencing IO outages while sending duplicate SYNs and erroneous RSTs during connection reestablishment (BZ#2094334)\n\n* using __this_cpu_read() in preemptible [00000000] code: kworker/u66:1/937154 (BZ#2095775)\n\n* Need some changes in RHEL8.x kernels. (BZ#2096932)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5626",
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5626.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:27:40+00:00",
"generator": {
"date": "2025-10-09T20:27:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5626",
"initial_release_date": "2022-07-19T21:14:02+00:00",
"revision_history": [
{
"date": "2022-07-19T21:14:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-07-19T21:14:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:27:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.57.1.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.57.1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-305.57.1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "perf-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "perf-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.57.1.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-305.57.1.el8_4.src",
"product": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.src",
"product_id": "kernel-0:4.18.0-305.57.1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-305.57.1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.57.1.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"product_id": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.57.1.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.src as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.src",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "perf-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux CRB EUS (v.8.4)",
"product_id": "CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"relates_to_product_reference": "CRB-8.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2021-4197",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-12-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035652"
}
],
"notes": [
{
"category": "description",
"text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4197"
},
{
"category": "external",
"summary": "RHBZ#2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/",
"url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"
}
],
"release_date": "2021-09-12T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks"
},
{
"cve": "CVE-2021-4203",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2036934"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "RHBZ#2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/",
"url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"
}
],
"release_date": "2021-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses"
},
{
"cve": "CVE-2021-47435",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: fix mempool NULL pointer race when completing IO",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "RHBZ#2282879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: fix mempool NULL pointer race when completing IO"
},
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"known_not_affected": [
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
},
{
"cve": "CVE-2022-49086",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347770"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Open vSwitch module in the Linux kernel. Improper handling of allocated memory can lead to a memory leak, potentially impacting system performance and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: net: openvswitch: fix leak of nested actions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue has been fixed in Red Hat Enterprise Linux 8.4, 8.7, 9.0 and 9.1 via RHSA-2022:5626 [1], RHSA-2022:7683 [2], RHSA-2022:8973 [3] and RHSA-2022:8267 [4], respectively.\n\n[1]. https://access.redhat.com/errata/RHSA-2022:5626\n\n[2]. https://access.redhat.com/errata/RHSA-2022:7683\n\n[3]. https://access.redhat.com/errata/RHSA-2022:8973\n\n[4]. https://access.redhat.com/errata/RHSA-2022:8267",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49086"
},
{
"category": "external",
"summary": "RHBZ#2347770",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347770"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49086"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2022-49086-a289@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022657-CVE-2022-49086-a289@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"BaseOS-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"BaseOS-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:bpftool-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.src",
"CRB-8.4.0.Z.EUS:kernel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-abi-stablelists-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-cross-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-core-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-doc-0:4.18.0-305.57.1.el8_4.noarch",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-headers-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-modules-extra-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-0:4.18.0-305.57.1.el8_4.x86_64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.aarch64",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.ppc64le",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.s390x",
"CRB-8.4.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-305.57.1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: net: openvswitch: fix leak of nested actions"
}
]
}
rhsa-2022_5224
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z18 Batch (BZ#2081080)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5224",
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5224.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-12-02T07:51:34+00:00",
"generator": {
"date": "2024-12-02T07:51:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:5224",
"initial_release_date": "2022-06-28T07:55:15+00:00",
"revision_history": [
{
"date": "2022-06-28T07:55:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-06-28T07:55:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-02T07:51:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.87.1.rt13.137.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-1966",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2093146"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel\u0027s netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2022-32250. Note: All CVE users should reference CVE-2022-32250 instead of this candidate.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "RHBZ#2093146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
}
],
"title": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)"
},
{
"cve": "CVE-2022-27666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061633"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in IPsec ESP transformation code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27666"
},
{
"category": "external",
"summary": "RHBZ#2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"url": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645"
}
],
"release_date": "2022-03-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "workaround",
"details": "The given exploit needs CAP_NET_ADMIN to set up IPsec SA and a user namespace is used to get that capability, so disabling unprivileged user namespaces gives some protection.\n~~~\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n~~~\nNote: If the target system is already using IPsec and has SA configured, then no additional privileges are needed to exploit the issue.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: buffer overflow in IPsec ESP transformation code"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
RHSA-2022:5249
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* make SHA512_arch algos and CRYPTO_USER built-ins (BZ#2072643)\n\n* SR-IOV performance \u003e 50% degradation (BZ#2074830)\n\n* fix data corruption caused by dm-integrity (BZ#2082187)\n\n* SCTP client-side peeloff issues [rhel-9] (BZ#2084044)\n\n* TCP connection fails in a asymmetric routing situation (BZ#2085480)\n\n* Fails to boot Multiple RT VMs each with multiple vCPUs (BZ#2086963)\n\n* spec: Fix separate tools build (BZ#2090852)\n\n* call traces related to eeh_pseries observed and vmcore is not captured, when kdump is triggered (BZ#2092255)\n\n* Mark ThunderX NIC driver as unmaintained (BZ#2092638)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5249",
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5249.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:53:16+00:00",
"generator": {
"date": "2025-10-09T21:53:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5249",
"initial_release_date": "2022-07-01T00:05:19+00:00",
"revision_history": [
{
"date": "2022-07-01T00:05:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-07-01T00:05:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:53:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.17.1.el9_0.src",
"product": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.src",
"product_id": "kernel-0:5.14.0-70.17.1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"product": {
"name": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"product_id": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-70.17.1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"product": {
"name": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"product_id": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@5.14.0-70.17.1.el9_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.src",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:05:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:05:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-1966",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2093146"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel\u0027s netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2022-32250. Note: All CVE users should reference CVE-2022-32250 instead of this candidate.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "RHBZ#2093146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:05:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
}
],
"title": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)"
},
{
"cve": "CVE-2022-27666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061633"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in IPsec ESP transformation code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27666"
},
{
"category": "external",
"summary": "RHBZ#2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"url": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645"
}
],
"release_date": "2022-03-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:05:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "workaround",
"details": "The given exploit needs CAP_NET_ADMIN to set up IPsec SA and a user namespace is used to get that capability, so disabling unprivileged user namespaces gives some protection.\n~~~\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n~~~\nNote: If the target system is already using IPsec and has SA configured, then no additional privileges are needed to exploit the issue.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: buffer overflow in IPsec ESP transformation code"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:05:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022:5224
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-8.2.z18 Batch (BZ#2081080)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5224",
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5224.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:27:39+00:00",
"generator": {
"date": "2025-10-09T20:27:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5224",
"initial_release_date": "2022-06-28T07:55:15+00:00",
"revision_history": [
{
"date": "2022-06-28T07:55:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-06-28T07:55:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:27:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::realtime"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::nfv"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"product": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"product_id": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.87.1.rt13.137.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.87.1.rt13.137.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV EUS (v. 8.2)",
"product_id": "NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "NFV-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src"
},
"product_reference": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time EUS (v. 8.2)",
"product_id": "RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"relates_to_product_reference": "RT-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-1966",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2093146"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel\u0027s netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2022-32250. Note: All CVE users should reference CVE-2022-32250 instead of this candidate.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "RHBZ#2093146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
}
],
"title": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)"
},
{
"cve": "CVE-2022-27666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061633"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in IPsec ESP transformation code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27666"
},
{
"category": "external",
"summary": "RHBZ#2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"url": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645"
}
],
"release_date": "2022-03-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "workaround",
"details": "The given exploit needs CAP_NET_ADMIN to set up IPsec SA and a user namespace is used to get that capability, so disabling unprivileged user namespaces gives some protection.\n~~~\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n~~~\nNote: If the target system is already using IPsec and has SA configured, then no additional privileges are needed to exploit the issue.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: buffer overflow in IPsec ESP transformation code"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T07:55:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"NFV-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"NFV-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.src",
"RT-8.2.0.Z.EUS:kernel-rt-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-devel-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-kvm-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64",
"RT-8.2.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-193.87.1.rt13.137.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022:5249
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* make SHA512_arch algos and CRYPTO_USER built-ins (BZ#2072643)\n\n* SR-IOV performance \u003e 50% degradation (BZ#2074830)\n\n* fix data corruption caused by dm-integrity (BZ#2082187)\n\n* SCTP client-side peeloff issues [rhel-9] (BZ#2084044)\n\n* TCP connection fails in a asymmetric routing situation (BZ#2085480)\n\n* Fails to boot Multiple RT VMs each with multiple vCPUs (BZ#2086963)\n\n* spec: Fix separate tools build (BZ#2090852)\n\n* call traces related to eeh_pseries observed and vmcore is not captured, when kdump is triggered (BZ#2092255)\n\n* Mark ThunderX NIC driver as unmaintained (BZ#2092638)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5249",
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5249.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:53:16+00:00",
"generator": {
"date": "2025-10-09T21:53:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5249",
"initial_release_date": "2022-07-01T00:05:19+00:00",
"revision_history": [
{
"date": "2022-07-01T00:05:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-07-01T00:05:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:53:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.17.1.el9_0.src",
"product": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.src",
"product_id": "kernel-0:5.14.0-70.17.1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"product": {
"name": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"product_id": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-70.17.1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"product": {
"name": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"product_id": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@5.14.0-70.17.1.el9_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.src",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:05:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:05:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-1966",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2093146"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel\u0027s netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2022-32250. Note: All CVE users should reference CVE-2022-32250 instead of this candidate.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "RHBZ#2093146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:05:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
}
],
"title": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)"
},
{
"cve": "CVE-2022-27666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061633"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in IPsec ESP transformation code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27666"
},
{
"category": "external",
"summary": "RHBZ#2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"url": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645"
}
],
"release_date": "2022-03-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:05:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "workaround",
"details": "The given exploit needs CAP_NET_ADMIN to set up IPsec SA and a user namespace is used to get that capability, so disabling unprivileged user namespaces gives some protection.\n~~~\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n~~~\nNote: If the target system is already using IPsec and has SA configured, then no additional privileges are needed to exploit the issue.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: buffer overflow in IPsec ESP transformation code"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:05:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
RHSA-2022:5633
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.4.z10 source tree (BZ#2087922)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5633",
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5633.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:27:40+00:00",
"generator": {
"date": "2025-10-09T20:27:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5633",
"initial_release_date": "2022-07-19T21:09:22+00:00",
"revision_history": [
{
"date": "2022-07-19T21:09:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-07-19T21:09:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:27:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT EUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.4::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"product": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"product_id": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.57.1.rt7.129.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-305.57.1.rt7.129.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux NFV EUS (v.8.4)",
"product_id": "NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "NFV-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src"
},
"product_reference": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64 as a component of Red Hat Enterprise Linux RT EUS (v.8.4)",
"product_id": "RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"relates_to_product_reference": "RT-8.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2021-4197",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-12-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035652"
}
],
"notes": [
{
"category": "description",
"text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4197"
},
{
"category": "external",
"summary": "RHBZ#2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/",
"url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"
}
],
"release_date": "2021-09-12T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks"
},
{
"cve": "CVE-2021-4203",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2036934"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "RHBZ#2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/",
"url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"
}
],
"release_date": "2021-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses"
},
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T21:09:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"NFV-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"NFV-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.src",
"RT-8.4.0.Z.EUS:kernel-rt-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-core-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debug-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-devel-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-kvm-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64",
"RT-8.4.0.Z.EUS:kernel-rt-modules-extra-0:4.18.0-305.57.1.rt7.129.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022_5636
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Backport request of \"genirq: use rcu in kstat_irqs_usr()\" (BZ#2083311)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5636",
"url": "https://access.redhat.com/errata/RHSA-2022:5636"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5636.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T14:54:03+00:00",
"generator": {
"date": "2024-11-15T14:54:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:5636",
"initial_release_date": "2022-07-19T15:31:52+00:00",
"revision_history": [
{
"date": "2022-07-19T15:31:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-07-19T15:31:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T14:54:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.1::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.70.1.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.70.1.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.70.1.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.src",
"product_id": "kernel-0:4.18.0-147.70.1.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.70.1.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.70.1.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.70.1.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.70.1.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.70.1.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.1)",
"product_id": "BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T15:31:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T15:31:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"known_not_affected": [
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-19T15:31:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5636"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:bpftool-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.src",
"BaseOS-8.1.0.Z.E4S:kernel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-cross-headers-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-core-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-devel-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-doc-0:4.18.0-147.70.1.el8_1.noarch",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-modules-extra-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:kernel-tools-libs-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-0:4.18.0-147.70.1.el8_1.x86_64",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.ppc64le",
"BaseOS-8.1.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-147.70.1.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
RHSA-2022:5267
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the latest RHEL-9.0.z1 Batch (BZ#2089492)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5267",
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.0_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.0_release_notes/index"
},
{
"category": "external",
"summary": "2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5267.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T21:53:19+00:00",
"generator": {
"date": "2025-10-09T21:53:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5267",
"initial_release_date": "2022-06-28T10:45:21+00:00",
"revision_history": [
{
"date": "2022-06-28T10:45:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-06-28T10:45:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T21:53:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"product": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"product_id": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.17.1.rt21.89.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@5.14.0-70.17.1.rt21.89.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src"
},
"product_reference": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 9)",
"product_id": "NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "NFV-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src"
},
"product_reference": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 9)",
"product_id": "RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"relates_to_product_reference": "RT-9.0.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T10:45:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T10:45:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-1966",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2093146"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel\u0027s netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2022-32250. Note: All CVE users should reference CVE-2022-32250 instead of this candidate.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "RHBZ#2093146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T10:45:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
}
],
"title": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)"
},
{
"cve": "CVE-2022-27666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061633"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in IPsec ESP transformation code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27666"
},
{
"category": "external",
"summary": "RHBZ#2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"url": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645"
}
],
"release_date": "2022-03-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T10:45:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "workaround",
"details": "The given exploit needs CAP_NET_ADMIN to set up IPsec SA and a user namespace is used to get that capability, so disabling unprivileged user namespaces gives some protection.\n~~~\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n~~~\nNote: If the target system is already using IPsec and has SA configured, then no additional privileges are needed to exploit the issue.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: buffer overflow in IPsec ESP transformation code"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T10:45:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"NFV-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.src",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-core-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-devel-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-kvm-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64",
"RT-9.0.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:5.14.0-70.17.1.rt21.89.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
RHSA-2022:5834
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-32250)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* The latest RHEL 8.6.z2 kernel changes need to be merged into the RT source tree to keep source parity between the two kernels. (BZ#2107215)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5834",
"url": "https://access.redhat.com/errata/RHSA-2022:5834"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5834.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T22:12:19+00:00",
"generator": {
"date": "2025-10-09T22:12:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5834",
"initial_release_date": "2022-08-02T08:17:16+00:00",
"revision_history": [
{
"date": "2022-08-02T08:17:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-08-02T08:17:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T22:12:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"product": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"product_id": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.19.1.rt7.176.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-372.19.1.rt7.176.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "NFV-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"relates_to_product_reference": "RT-8.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-08-02T08:17:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5834"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-08-02T08:17:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5834"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"NFV-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.src",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64",
"RT-8.6.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-372.19.1.rt7.176.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022:5220
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* slub corruption during LPM of hnv interface (BZ#2081252)\n\n* sleeping function called from invalid context at kernel/locking/spinlock_rt.c:35 (BZ#2082090)\n\n* Backport request of \"genirq: use rcu in kstat_irqs_usr()\" (BZ#2083310)\n\n* kernel memory leak while freeing nested actions (BZ#2086604)\n\n* dm: sync rhel-8.6 with upstream 5.13 through 5.16 fixes and improvements (BZ#2088036)\n\n* NFS processing deadlock in low memory condition (BZ#2094459)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5220",
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5220.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T20:27:39+00:00",
"generator": {
"date": "2025-10-09T20:27:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:5220",
"initial_release_date": "2022-06-28T12:32:10+00:00",
"revision_history": [
{
"date": "2022-06-28T12:32:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-06-28T12:32:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T20:27:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.87.1.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.87.1.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.87.1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "perf-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "perf-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.87.1.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-193.87.1.el8_2.src",
"product": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.src",
"product_id": "kernel-0:4.18.0-193.87.1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.87.1.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"product_id": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.87.1.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.src",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "perf-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.2)",
"product_id": "CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"relates_to_product_reference": "CRB-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-29368",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2020-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903244"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29368"
},
{
"category": "external",
"summary": "RHBZ#1903244",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368"
}
],
"release_date": "2020-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check"
},
{
"cve": "CVE-2021-47435",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: fix mempool NULL pointer race when completing IO",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "RHBZ#2282879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: fix mempool NULL pointer race when completing IO"
},
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-1966",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2093146"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel\u0027s netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2022-32250. Note: All CVE users should reference CVE-2022-32250 instead of this candidate.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "RHBZ#2093146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
}
],
"title": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)"
},
{
"cve": "CVE-2022-27666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061633"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in IPsec ESP transformation code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27666"
},
{
"category": "external",
"summary": "RHBZ#2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"url": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645"
}
],
"release_date": "2022-03-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "workaround",
"details": "The given exploit needs CAP_NET_ADMIN to set up IPsec SA and a user namespace is used to get that capability, so disabling unprivileged user namespaces gives some protection.\n~~~\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n~~~\nNote: If the target system is already using IPsec and has SA configured, then no additional privileges are needed to exploit the issue.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: buffer overflow in IPsec ESP transformation code"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-06-28T12:32:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"BaseOS-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:bpftool-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.src",
"CRB-8.2.0.Z.EUS:kernel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-cross-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-core-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-doc-0:4.18.0-193.87.1.el8_2.noarch",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-headers-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-modules-extra-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-0:4.18.0-193.87.1.el8_2.x86_64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.aarch64",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.ppc64le",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.s390x",
"CRB-8.2.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-193.87.1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
rhsa-2022_5249
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak (CVE-2022-1012)\n\n* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729)\n\n* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966)\n\n* kernel: buffer overflow in IPsec ESP transformation code (CVE-2022-27666)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* make SHA512_arch algos and CRYPTO_USER built-ins (BZ#2072643)\n\n* SR-IOV performance \u003e 50% degradation (BZ#2074830)\n\n* fix data corruption caused by dm-integrity (BZ#2082187)\n\n* SCTP client-side peeloff issues [rhel-9] (BZ#2084044)\n\n* TCP connection fails in a asymmetric routing situation (BZ#2085480)\n\n* Fails to boot Multiple RT VMs each with multiple vCPUs (BZ#2086963)\n\n* spec: Fix separate tools build (BZ#2090852)\n\n* call traces related to eeh_pseries observed and vmcore is not captured, when kdump is triggered (BZ#2092255)\n\n* Mark ThunderX NIC driver as unmaintained (BZ#2092638)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:5249",
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5249.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-12-02T07:52:17+00:00",
"generator": {
"date": "2024-12-02T07:52:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:5249",
"initial_release_date": "2022-07-01T00:05:19+00:00",
"revision_history": [
{
"date": "2022-07-01T00:05:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-07-01T00:05:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-02T07:52:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product": {
"name": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product_id": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.17.1.el9_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product": {
"name": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_id": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.17.1.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product": {
"name": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product_id": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.17.1.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"product": {
"name": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"product_id": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@5.14.0-70.17.1.el9_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:5.14.0-70.17.1.el9_0.src",
"product": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.src",
"product_id": "kernel-0:5.14.0-70.17.1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"product": {
"name": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"product_id": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@5.14.0-70.17.1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"product": {
"name": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"product_id": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@5.14.0-70.17.1.el9_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.src",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch"
},
"product_reference": "kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Moshe Kol"
],
"organization": "Hebrew University"
}
],
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064604"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel\u0027s TCP source port generation algorithm in the TCP stack contains a flaw due to the small table perturb size. This flaw allows an attacker to positively distinguish a system among devices with identical hardware and software, which lasts until the device restarts.\r\n\r\nAn attacker can guess the evolution of the internal state used for source port generation. This information is used to infer the TCP traffic patterns of the victim, guessing the number of outgoing TCP connections established in a specific time frame, which can lead to a system fingerprinting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux version 7 (RHEL7) is not affected by this issue. While RHEL7 implements the TCP port randomization algorithm 3 (the Simple Hash-Based Port Selection Algorithm), which knowingly has shortcomings (as per RFC 6056, item 3.3.3), the object of study of this flaw was the TCP port selector algorithm 4, the Double-Hash Port Selection Algorithm, which is not existent in RHEL7.\n\nThis flaw is ranked as a Moderate impact due to:\n* Limited exposure of the data in the TCP stack;\n* The impact of this vulnerability is limited to a system fingerprinting;\n* The requirements to carry the attack are elevated, requiring monitoring of the data flow.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "RHBZ#2064604",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1012"
},
{
"category": "external",
"summary": "https://arxiv.org/abs/2209.12993",
"url": "https://arxiv.org/abs/2209.12993"
},
{
"category": "external",
"summary": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4",
"url": "https://datatracker.ietf.org/doc/html/rfc6056#section-3.3.4"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/",
"url": "https://lore.kernel.org/lkml/20220428124001.7428-1-w@1wt.eu/"
},
{
"category": "external",
"summary": "https://lwn.net/Articles/910435/",
"url": "https://lwn.net/Articles/910435/"
}
],
"release_date": "2022-05-02T04:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:05:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak"
},
{
"acknowledgments": [
{
"names": [
"Norbert Slusarek"
]
}
],
"cve": "CVE-2022-1729",
"cwe": {
"id": "CWE-366",
"name": "Race Condition within a Thread"
},
"discovery_date": "2022-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2086753"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s performance events functionality. A user triggers a race condition in setting up performance monitoring between the leading PERF_TYPE_TRACEPOINT and sub PERF_EVENT_HARDWARE plus the PERF_EVENT_SOFTWARE using the perf_event_open() function with these three types. This flaw allows a local user to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition in perf_event_open leads to privilege escalation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "RHBZ#2086753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1729"
}
],
"release_date": "2022-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:05:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: race condition in perf_event_open leads to privilege escalation"
},
{
"cve": "CVE-2022-1966",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2093146"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] A use-after-free vulnerability has been identified in the Linux Kernel\u0027s netfilter subsystem that did not properly handle the removal of stateful expressions in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been rejected. This candidate is a duplicate of CVE-2022-32250. Note: All CVE users should reference CVE-2022-32250 instead of this candidate.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "RHBZ#2093146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1966"
}
],
"release_date": "2022-06-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:05:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
}
],
"title": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)"
},
{
"cve": "CVE-2022-27666",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061633"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: buffer overflow in IPsec ESP transformation code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-27666"
},
{
"category": "external",
"summary": "RHBZ#2061633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061633"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27666"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645",
"url": "https://github.com/torvalds/linux/commit/ebe48d368e97d007bfeb76fcb065d6cfc4c96645"
}
],
"release_date": "2022-03-11T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:05:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "workaround",
"details": "The given exploit needs CAP_NET_ADMIN to set up IPsec SA and a user namespace is used to get that capability, so disabling unprivileged user namespaces gives some protection.\n~~~\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n~~~\nNote: If the target system is already using IPsec and has SA configured, then no additional privileges are needed to exploit the issue.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: buffer overflow in IPsec ESP transformation code"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-05-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092427"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the Linux kernel\u0027s Netfilter subsystem in net/netfilter/nf_tables_api.c. This flaw allows a local attacker with user access to cause a privilege escalation issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The latest kernel in RHCOS is kernel-4.18.0-305.49.1.el8 which does not contain the vulnerable code and is not affected, also OCP v4.9 or earlier are not affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "RHBZ#2092427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092427"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32250"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/net/netfilter?id=520778042ccca019f3ffa136dd0ca565c486cedd"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2022/05/31/1",
"url": "https://www.openwall.com/lists/oss-security/2022/05/31/1"
}
],
"release_date": "2022-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-07-01T00:05:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"AppStream-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"BaseOS-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:bpftool-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.src",
"CRB-9.0.0.Z.MAIN.EUS:kernel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-abi-stablelists-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-cross-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-core-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-devel-matched-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-doc-0:5.14.0-70.17.1.el9_0.noarch",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-headers-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-modules-extra-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-devel-matched-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-0:5.14.0-70.17.1.el9_0.x86_64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.aarch64",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.ppc64le",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.s390x",
"CRB-9.0.0.Z.MAIN.EUS:python3-perf-debuginfo-0:5.14.0-70.17.1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root"
}
]
}
suse-su-2022:2615-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP4 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n- CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).\n- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).\n- CVE-2022-33743: Fixed a Denial of Service related to XDP (bsc#1200763).\n- CVE-2022-1966: Fixed a use-after-free vulnerability in the Netfilter subsystem. This flaw allowed a local attacker with user access to cause a privilege escalation issue. (bnc#1200015)\n- CVE-2022-1852: Fixed a null-ptr-deref in the kvm module which can lead to DoS. (bsc#1199875)\n- CVE-2022-1789: Fixed a NULL pointer dereference when shadow paging is enabled. (bnc#1199674)\n- CVE-2022-1508: Fixed an out-of-bounds read flaw that could cause the system to crash. (bsc#1198968)\n- CVE-2022-1671: Fixed a null-ptr-deref bugs in net/rxrpc/server_key.c, unprivileged users could easily trigger it via ioctl. (bsc#1199439)\n- CVE-2022-1651: Fixed a bug in ACRN Device Model emulates virtual NICs in VM. This flaw may allow a local privileged attacker to leak kernel unauthorized information and also cause a denial of service problem. (bsc#1199433)\n- CVE-2022-29582: Fixed a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently. (bnc#1198811)\n- CVE-2022-0494: Fixed a kernel information leak flaw in the scsi_ioctl function. This flaw allowed a local attacker with a special user privilege to create issues with confidentiality. (bnc#1197386)\n- CVE-2021-4204: Fixed a vulnerability that allows local attackers to escalate privileges on affected installations via ebpf. (bnc#1194111)\n- CVE-2022-23222: Fixed a bug that allowed local users to gain privileges. (bnc#1194765)\n- CVE-2022-0264: Fixed a vulnerability in the Linux kernel\u0027s eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. (bnc#1194826)\n- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)\n- CVE-2022-1205: Fixed null pointer dereference and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198027)\n- CVE-2022-1198: Fixed an use-after-free vulnerability that allow an attacker to crash the linux kernel by simulating Amateur Radio (bsc#1198030).\n- CVE-2022-1972: Fixed a buffer overflow in nftable that could lead to privilege escalation. (bsc#1200019)\n- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).\n- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).\n- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).\n- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).\n- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)\n- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it\u0027s been trivial to break out of it with kgdb or kdb. (bsc#1199426)\n- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)\n- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)\n- CVE-2021-45402: The check_alu_op function in kernel/bpf/verifier.c did not properly update bounds while handling the mov32 instruction, which allowed local users to obtain potentially sensitive address information (bsc#1196130).\n- CVE-2022-1679: Fixed use-after-free in ath9k in ath9k_hif_usb_rx_cb (bsc#1199487).\n- CVE-2022-20132: Fixed several potential out of bounds reads via malicious HID device (bsc#1200619).\n- CVE-2022-1012: Fixed an information leak in net/ipv4/tcp.c (bsc#1199482).\n- CVE-2022-33981: Fixed use-after-free in floppy driver (bnc#1200692).\n- CVE-2022-1998: Fixed use-after-free in fanotify (bnc#1200284).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: fix return value of __setup handlers (git-fixes).\n- ACPI/APEI: Limit printable size of BERT table data (git-fixes).\n- ACPI: battery: Add device HID and quirk for Microsoft Surface Go 3 (git-fixes).\n- ACPI: bus: Avoid using CPPC if not supported by firmware (bsc#1199793).\n- ACPICA: Avoid cache flush inside virtual machines (git-fixes).\n- ACPICA: Avoid walking the ACPI Namespace if it is not there (git-fixes).\n- ACPI: CPPC: Assume no transition latency if no PCCT (git-fixes).\n- ACPI: CPPC: Avoid out of bounds access when parsing _CPC data (git-fixes).\n- ACPI: docs: enumeration: Amend PWM enumeration ASL example (git-fixes).\n- ACPI: docs: enumeration: Discourage to use custom _DSM methods (git-fixes).\n- ACPI: docs: enumeration: Remove redundant .owner assignment (git-fixes).\n- ACPI: docs: enumeration: Update UART serial bus resource documentation (git-fixes).\n- ACPI/IORT: Check node revision for PMCG resources (git-fixes).\n- ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default (git-fixes).\n- ACPI: PM: Revert \u0027Only mark EC GPE for wakeup on Intel systems\u0027 (git-fixes).\n- ACPI: PM: s2idle: Cancel wakeup before dispatching EC GPE (git-fixes).\n- ACPI: processor idle: Allow playing dead in C3 state (git-fixes).\n- ACPI: processor: idle: Avoid falling back to C3 type C-states (git-fixes).\n- ACPI: processor idle: Check for architectural support for LPI (git-fixes).\n- ACPI: processor: idle: fix lockup regression on 32-bit ThinkPad T40 (git-fixes).\n- ACPI: properties: Consistently return -ENOENT if there are no more references (git-fixes).\n- ACPI: property: Release subnode properties with data nodes (git-fixes).\n- ACPI: sysfs: Fix BERT error region memory mapping (git-fixes).\n- ACPI: video: Change how we determine if brightness key-presses are handled (git-fixes).\n- ACPI: video: Force backlight native for Clevo NL5xRU and NL5xNU (git-fixes).\n- ACPI / x86: Work around broken XSDT on Advantech DAC-BJ01 board (git-fixes).\n- Add missing recommends of kernel-install-tools to kernel-source-vanilla (bsc#1200442)\n- Add references to IBM bugs\n- Add various fsctl structs (bsc#1193629).\n- Adjust cifssb maximum read size (bsc#1193629).\n- af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register (git-fixes).\n- aio: Fix incorrect usage of eventfd_signal_allowed() (git-fixes).\n- ALSA: cmipci: Restore aux vol on suspend/resume (git-fixes).\n- ALSA: core: Add snd_card_free_on_error() helper (git-fixes).\n- ALSA: cs4236: fix an incorrect NULL check on list iterator (git-fixes).\n- ALSA: ctxfi: Add SB046x PCI ID (git-fixes).\n- ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction (git-fixes).\n- ALSA: fireworks: fix wrong return count shorter than expected by 4 bytes (git-fixes).\n- ALSA: hda: Add AlderLake-PS variant PCI ID (git-fixes).\n- ALSA: hda: Add PCI and HDMI IDs for Intel Raptor Lake (git-fixes).\n- ALSA: hda: Avoid unsol event during RPM suspending (git-fixes).\n- ALSA: hda/conexant - Fix loopback issue with CX20632 (git-fixes).\n- ALSA: hda/conexant: Fix missing beep setup (git-fixes).\n- ALSA: hda: Fix discovery of i915 graphics PCI device (bsc#1200611).\n- ALSA: hda: Fix driver index handling at re-binding (git-fixes).\n- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).\n- ALSA: hda: Fix regression on forced probe mask option (git-fixes).\n- ALSA: hda: Fix signedness of sscanf() arguments (git-fixes).\n- ALSA: hda - fix unused Realtek function when PM is not enabled (git-fixes).\n- ALSA: hda/hdmi: fix warning about PCM count when used with SOF (git-fixes).\n- ALSA: hda/i915: Fix one too many pci_dev_put() (git-fixes).\n- ALSA: hda/i915 - skip acomp init if no matching display (git-fixes).\n- ALSA: hda: intel-dspcfg: use SOF for UpExtreme and UpExtreme11 boards (git-fixes).\n- ALSA: hda: intel-dsp-config: update AlderLake PCI IDs (git-fixes).\n- ALSA: hda: intel-nhlt: remove use of __func__ in dev_dbg (git-fixes).\n- ALSA: hda/realtek: Add alc256-samsung-headphone fixup (git-fixes).\n- ALSA: hda/realtek - Add HW8326 support (git-fixes).\n- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).\n- ALSA: hda/realtek - Add new type for ALC245 (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GA402 (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD50PNT (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).\n- ALSA: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Dev One (git-fixes).\n- ALSA: hda/realtek: Add quirk for Legion Y9000X 2019 (git-fixes).\n- ALSA: hda/realtek: add quirk for Lenovo Thinkpad X12 speakers (git-fixes).\n- ALSA: hda/realtek: Add quirk for the Framework Laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).\n- ALSA: hda/realtek: Add quirk for Yoga Duet 7 13ITL6 speakers (git-fixes).\n- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).\n- ALSA: hda/realtek: Apply fixup for Lenovo Yoga Duet 7 properly (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9520 laptop (git-fixes).\n- ALSA: hda/realtek: Enable headset mic on Lenovo P360 (git-fixes).\n- ALSA: hda/realtek: Fix audio regression on Mi Notebook Pro 2020 (git-fixes).\n- ALSA: hda/realtek: Fix deadlock by COEF mutex (bsc#1195913).\n- ALSA: hda/realtek: Fix for quirk to enable speaker output on the Lenovo Yoga DuetITL 2021 (git-fixes).\n- ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc671 (git-fixes).\n- ALSA: hda/realtek - Fix microphone noise on ASUS TUF B550M-PLUS (git-fixes).\n- ALSA: hda: realtek: Fix race at concurrent COEF updates (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).\n- ALSA: hda: Set max DMA segment size (git-fixes).\n- ALSA: hda: Skip codec shutdown in case the codec is not registered (git-fixes).\n- ALSA: hda/via: Fix missing beep setup (git-fixes).\n- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).\n- ALSA: memalloc: Fix dma_need_sync() checks (bsc#1195913).\n- ALSA: memalloc: invalidate SG pages before sync (bsc#1195913).\n- ALSA: oss: Fix PCM OSS buffer allocation overflow (git-fixes).\n- ALSA: pci: fix reading of swapped values from pcmreg in AC97 codec (git-fixes).\n- ALSA: pcm: Add stream lock during PCM reset ioctl operations (git-fixes).\n- ALSA: pcm: Check for null pointer of pointer substream before dereferencing it (git-fixes).\n- ALSA: pcm: Fix races among concurrent hw_params and hw_free calls (git-fixes).\n- ALSA: pcm: Fix races among concurrent prealloc proc writes (git-fixes).\n- ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls (git-fixes).\n- ALSA: pcm: Fix races among concurrent read/write and buffer changes (git-fixes).\n- ALSA: pcm: Test for \u0027silence\u0027 field in struct \u0027pcm_format_data\u0027 (git-fixes).\n- ALSA: spi: Add check for clk_enable() (git-fixes).\n- ALSA: usb-audio: add mapping for MSI MAG X570S Torpedo MAX (git-fixes).\n- ALSA: usb-audio: add mapping for new Corsair Virtuoso SE (git-fixes).\n- ALSA: usb-audio: Add missing ep_idx in fixed EP quirks (git-fixes).\n- ALSA: usb-audio: Add mute TLV for playback volumes on RODE NT-USB (git-fixes).\n- ALSA: usb-audio: Add quirk bits for enabling/disabling generic implicit fb (git-fixes).\n- ALSA: usb-audio: Cancel pending work at closing a MIDI substream (git-fixes).\n- ALSA: usb-audio: Cap upper limits of buffer/period bytes for implicit fb (git-fixes).\n- ALSA: usb-audio: Clear MIDI port active flag after draining (git-fixes).\n- ALSA: usb-audio: Configure sync endpoints before data (git-fixes).\n- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).\n- ALSA: usb-audio: Do not abort resume upon errors (bsc#1195913).\n- ALSA: usb-audio: Do not get sample rate for MCT Trigger 5 USB-to-HDMI (git-fixes).\n- ALSA: usb-audio: Fix undefined behavior due to shift overflowing the constant (git-fixes).\n- ALSA: usb-audio: Increase max buffer size (git-fixes).\n- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).\n- ALSA: usb-audio: Limit max buffer and period sizes per time (git-fixes).\n- ALSA: usb-audio: Move generic implicit fb quirk entries into quirks.c (git-fixes).\n- ALSA: usb-audio: Optimize TEAC clock quirk (git-fixes).\n- ALSA: usb-audio: Restore Rane SL-1 quirk (git-fixes).\n- ALSA: usb-audio: revert to IMPLICIT_FB_FIXED_DEV for M-Audio FastTrack Ultra (git-fixes).\n- ALSA: usb-audio: Set up (implicit) sync for Saffire 6 (git-fixes).\n- ALSA: usb-audio: Skip generic sync EP parse for secondary EP (git-fixes).\n- ALSA: usb-audio: US16x08: Move overflow check before array access (git-fixes).\n- ALSA: usb-audio: Workaround for clock setup on TEAC devices (git-fixes).\n- ALSA: wavefront: Proper check of get_user() error (git-fixes).\n- ALSA: x86: intel_hdmi_audio: enable pm_runtime and set autosuspend delay (git-fixes).\n- ALSA: x86: intel_hdmi_audio: use pm_runtime_resume_and_get() (git-fixes).\n- alx: acquire mutex for alx_reinit in alx_change_mtu (git-fixes).\n- amd/display: set backlight only if required (git-fixes).\n- arch/arm64: Fix topology initialization for core scheduling (git-fixes).\n- arm64: Add Cortex-A510 CPU part definition (git-fixes).\n- arm64: Add part number for Arm Cortex-A78AE (git-fixes).\n- arm64: Add support for user sub-page fault probing (git-fixes)\n- arm64: alternatives: mark patch_alternative() as `noinstr` (git-fixes).\n- arm64: avoid fixmap race condition when create pud mapping (git-fixes).\n- arm64: compat: Do not treat syscall number as ESR_ELx for a bad syscall (git-fixes).\n- arm64: Correct wrong label in macro __init_el2_gicv3 (git-fixes).\n- arm64: defconfig: build imx-sdma as a module (git-fixes).\n- arm64: do not abuse pfn_valid() to ensure presence of linear map (git-fixes).\n- arm64: Do not defer reserve_crashkernel() for platforms with no DMA memory zones (git-fixes).\n- arm64: Do not include __READ_ONCE() block in assembly files (git-fixes).\n- arm64: dts: agilex: use the compatible \u0027intel,socfpga-agilex-hsotg\u0027 (git-fixes).\n- arm64: dts: armada-3720-turris-mox: Add missing ethernet0 alias (git-fixes).\n- arm64: dts: broadcom: bcm4908: use proper TWD binding (git-fixes).\n- arm64: dts: broadcom: Fix sata nodename (git-fixes).\n- arm64: dts: imx8mm-beacon: Enable RTS-CTS on UART3 (git-fixes).\n- arm64: dts: imx8mm-venice: fix spi2 pin configuration (git-fixes)\n- arm64: dts: imx8mn-beacon: Enable RTS-CTS on UART3 (git-fixes).\n- arm64: dts: imx8mn-ddr4-evk: Describe the 32.768 kHz PMIC clock (git-fixes)\n- arm64: dts: imx8mn: Fix SAI nodes (git-fixes)\n- arm64: dts: imx8mp-evk: correct eqos pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct gpio-led pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct I2C1 pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct I2C3 pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct mmc pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct the uart2 pinctl value (git-fixes).\n- arm64: dts: imx8mp-evk: correct vbus pad settings (git-fixes).\n- arm64: dts: imx8mp-phyboard-pollux-rdk: correct eqos pad settings (git-fixes).\n- arm64: dts: imx8mp-phyboard-pollux-rdk: correct i2c2 \u0026 mmc settings (git-fixes).\n- arm64: dts: imx8mp-phyboard-pollux-rdk: correct uart pad settings (git-fixes).\n- arm64: dts: imx8mq: fix lcdif port node (git-fixes).\n- arm64: dts: imx8qm: Correct SCU clock controller\u0027s compatible (git-fixes)\n- arm64: dts: imx: Fix imx8*-var-som touchscreen property sizes (git-fixes).\n- arm64: dts: juno: Remove GICv2m dma-range (git-fixes).\n- arm64: dts: ls1028a-qds: move rtc node to the correct i2c bus (git-fixes).\n- arm64: dts: ls1043a: Update i2c dma properties (git-fixes).\n- arm64: dts: ls1046a: Update i2c node dma properties (git-fixes).\n- arm64: dts: marvell: armada-37xx: Remap IO space to bus address 0x0 (git-fixes).\n- arm64: dts: marvell: espressobin-ultra: enable front USB3 port (git-fixes).\n- arm64: dts: marvell: espressobin-ultra: fix SPI-NOR config (git-fixes).\n- arm64: dts: meson-g12: add ATF BL32 reserved-memory region (git-fixes).\n- arm64: dts: meson-g12b-odroid-n2: fix typo \u0027dio2133\u0027 (git-fixes).\n- arm64: dts: meson-g12: drop BL32 region from SEI510/SEI610 (git-fixes).\n- arm64: dts: meson-gx: add ATF BL32 reserved-memory region (git-fixes).\n- arm64: dts: meson: remove CPU opps below 1GHz for G12B boards (git-fixes).\n- arm64: dts: meson: remove CPU opps below 1GHz for SM1 boards (git-fixes).\n- arm64: dts: meson-sm1-bananapi-m5: fix wrong GPIO domain for GPIOE_2 (git-fixes).\n- arm64: dts: meson-sm1-bananapi-m5: fix wrong GPIO pin labeling for CON1 (git-fixes).\n- arm64: dts: meson-sm1-odroid: fix boot loop after reboot (git-fixes).\n- arm64: dts: meson-sm1-odroid: use correct enable-gpio pin for tf-io regulator (git-fixes).\n- arm64: dts: mt8192: Fix nor_flash status disable typo (git-fixes).\n- arm64: dts: ns2: Fix spi-cpol and spi-cpha property (git-fixes).\n- arm64: dts: qcom: ipq8074: fix the sleep clock frequency (git-fixes).\n- arm64: dts: qcom: msm8916-huawei-g7: Clarify installation instructions (git-fixes).\n- arm64: dts: qcom: msm8994: Fix BLSP[12]_DMA channels count (git-fixes).\n- arm64: dts: qcom: msm8994: Fix CPU6/7 reg values (git-fixes).\n- arm64: dts: qcom: msm8994: Fix the cont_splash_mem address (git-fixes).\n- arm64: dts: qcom: msm8996: Drop flags for mdss irqs (git-fixes).\n- arm64: dts: qcom: msm8996: remove snps,dw-pcie compatibles (git-fixes).\n- arm64: dts: qcom: pm8350c: stop depending on thermal_zones label (git-fixes).\n- arm64: dts: qcom: pmr735a: stop depending on thermal_zones label (git-fixes).\n- arm64: dts: qcom: qrb5165-rb5: Fix can-clock node name (git-fixes).\n- arm64: dts: qcom: sdm845-db845c: add wifi variant property (git-fixes).\n- arm64: dts: qcom: sdm845: Drop flags for mdss irqs (git-fixes).\n- arm64: dts: qcom: sdm845: fix microphone bias properties and values (git-fixes).\n- arm64: dts: qcom: sdm845: remove snps,dw-pcie compatibles (git-fixes).\n- arm64: dts: qcom: sdm845-xiaomi-beryllium: fix typo in panel\u0027s vddio-supply property (git-fixes).\n- arm64: dts: qcom: sm8150: Correct TCS configuration for apps rsc (git-fixes).\n- arm64: dts: qcom: sm8250: Drop flags for mdss irqs (git-fixes).\n- arm64: dts: qcom: sm8250: Fix MSI IRQ for PCIe1 and PCIe2 (git-fixes).\n- arm64: dts: qcom: sm8250: fix PCIe bindings to follow schema (git-fixes).\n- arm64: dts: qcom: sm8350: Correct TCS configuration for apps rsc (git-fixes).\n- arm64: dts: qcom: sm8350: Correct UFS symbol clocks (git-fixes).\n- arm64: dts: qcom: sm8350: Describe GCC dependency clocks (git-fixes).\n- arm64: dts: qcom: sm8350: Shorten camera-thermal-bottom name (git-fixes).\n- arm64: dts: renesas: Fix thermal bindings (git-fixes).\n- arm64: dts: renesas: ulcb-kf: fix wrong comment (git-fixes).\n- arm64: dts: rockchip: align pl330 node name with dtschema (git-fixes).\n- arm64: dts: rockchip: fix rk3399-puma eMMC HS400 signal integrity (git-fixes).\n- arm64: dts: rockchip: fix rk3399-puma-haikou USB OTG mode (git-fixes).\n- arm64: dts: rockchip: Fix SDIO regulator supply properties on rk3399-firefly (git-fixes).\n- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes).\n- arm64: dts: rockchip: reorder rk3399 hdmi clocks (git-fixes).\n- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).\n- arm64: dts: ti: j7200-main: Fix \u0027dtbs_check\u0027 serdes_ln_ctrl node (git-fixes).\n- arm64: dts: ti: j721e-main: Fix \u0027dtbs_check\u0027 in serdes_ln_ctrl node (git-fixes).\n- arm64: dts: ti: k3-am64: Fix gic-v3 compatible regs (git-fixes).\n- arm64: dts: ti: k3-am64-main: Remove support for HS400 speed mode (git-fixes).\n- arm64: dts: ti: k3-am64-mcu: remove incorrect UART base clock rates (git-fixes).\n- arm64: dts: ti: k3-am65: Fix gic-v3 compatible regs (git-fixes).\n- arm64: dts: ti: k3-j7200: Fix gic-v3 compatible regs (git-fixes).\n- arm64: dts: ti: k3-j721e: Fix gic-v3 compatible regs (git-fixes).\n- arm64: Enable repeat tlbi workaround on KRYO4XX gold CPUs (git-fixes).\n- arm64: Ensure execute-only permissions are not allowed without EPAN (git-fixes)\n- arm64: fix clang warning about TRAMP_VALIAS (git-fixes).\n- arm64: fix types in copy_highpage() (git-fixes).\n- arm64: ftrace: consistently handle PLTs (git-fixes).\n- arm64: ftrace: fix branch range checks (git-fixes).\n- arm64: kasan: fix include error in MTE functions (git-fixes).\n- arm64: kvm: keep the field workaround_flags in structure kvm_vcpu_arch (git-fixes).\n- arm64: Mark start_backtrace() notrace and NOKPROBE_SYMBOL (git-fixes)\n- arm64: mm: Drop \u0027const\u0027 from conditional arm64_dma_phys_limit definition (git-fixes).\n- arm64: mm: fix p?d_leaf() (git-fixes).\n- arm64: module: remove (NOLOAD) from linker script (git-fixes).\n- arm64: mte: Ensure the cleared tags are visible before setting the PTE (git-fixes).\n- arm64: paravirt: Use RCU read locks to guard stolen_time (git-fixes).\n- arm64: patch_text: Fixup last cpu should be master (git-fixes).\n- arm64: prevent instrumentation of bp hardening callbacks (git-fixes).\n- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).\n- arm64: stackleak: fix current_top_of_stack() (git-fixes).\n- arm64: supported.conf: mark PHY_FSL_IMX8MQ_USB as supported (bsc#1199909)\n- arm64: tegra: Add missing DFLL reset on Tegra210 (git-fixes).\n- arm64: tegra: Adjust length of CCPLEX cluster MMIO region (git-fixes).\n- arm64: Update config files. (bsc#1199909) Add pfuze100 regulator as module\n- arm64: vdso: fix makefile dependency on vdso.so (git-fixes).\n- ARM: 9178/1: fix unmet dependency on BITREVERSE for HAVE_ARCH_BITREVERSE (git-fixes).\n- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).\n- ARM: 9187/1: JIVE: fix return value of __setup handler (git-fixes).\n- ARM: 9191/1: arm/stacktrace, kasan: Silence KASAN warnings in unwind_frame() (git-fixes).\n- ARM: 9196/1: spectre-bhb: enable for Cortex-A15 (git-fixes).\n- ARM: 9197/1: spectre-bhb: fix loop8 sequence for Thumb2 (git-fixes).\n- ARM: at91: fix soc detection for SAM9X60 SiPs (git-fixes).\n- ARM: at91: pm: use proper compatible for sama5d2\u0027s rtc (git-fixes).\n- ARM: at91: pm: use proper compatibles for sam9x60\u0027s rtc and rtt (git-fixes).\n- ARM: boot: dts: bcm2711: Fix HVS register range (git-fixes).\n- ARM: cns3xxx: Fix refcount leak in cns3xxx_init (git-fixes).\n- ARM: configs: multi_v5_defconfig: re-enable CONFIG_V4L_PLATFORM_DRIVERS (git-fixes).\n- ARM: configs: multi_v5_defconfig: re-enable DRM_PANEL and FB_xxx (git-fixes).\n- ARM: config: u8500: Re-enable AB8500 battery charging (git-fixes).\n- ARM: davinci: da850-evm: Avoid NULL pointer dereference (git-fixes).\n- ARM: Do not use NOCROSSREFS directive with ld.lld (git-fixes).\n- ARM: dts: am3517-evm: Fix misc pinmuxing (git-fixes).\n- ARM: dts: aspeed: Add ADC for AST2600 and enable for Rainier and Everest (git-fixes).\n- ARM: dts: aspeed: Add secure boot controller node (git-fixes).\n- ARM: dts: aspeed: Add video engine to g6 (git-fixes).\n- ARM: dts: aspeed: ast2600-evb: Enable RX delay for MAC0/MAC1 (git-fixes).\n- ARM: dts: aspeed: Fix AST2600 quad spi group (git-fixes).\n- ARM: dts: aspeed-g6: fix SPI1/SPI2 quad pin group (git-fixes).\n- ARM: dts: aspeed-g6: remove FWQSPID group in pinctrl dtsi (git-fixes).\n- ARM: dts: at91: fix pinctrl phandles (git-fixes).\n- ARM: dts: at91: Map MCLK for wm8731 on at91sam9g20ek (git-fixes).\n- ARM: dts: at91: sam9x60ek: fix eeprom compatible and size (git-fixes).\n- ARM: dts: at91: sama5d2: Fix PMERRLOC resource size (git-fixes).\n- ARM: dts: at91: sama5d2_icp: fix eeprom compatibles (git-fixes).\n- ARM: dts: at91: sama5d4_xplained: fix pinctrl phandle name (git-fixes).\n- ARM: dts: bcm2711: Add the missing L1/L2 cache information (git-fixes).\n- ARM: dts: bcm2711-rpi-400: Fix GPIO line names (git-fixes).\n- ARM: dts: bcm2835-rpi-b: Fix GPIO line names (git-fixes).\n- ARM: dts: bcm2835-rpi-zero-w: Fix GPIO line name for Wifi/BT (git-fixes).\n- ARM: dts: bcm2837: Add the missing L1/L2 cache information (git-fixes).\n- ARM: dts: bcm2837-rpi-3-b-plus: Fix GPIO line name of power LED (git-fixes).\n- ARM: dts: bcm2837-rpi-cm3-io3: Fix GPIO line names for SMPS I2C (git-fixes).\n- ARM: dts: BCM5301X: update CRU block description (git-fixes).\n- ARM: dts: BCM5301X: Update pin controller node name (git-fixes).\n- ARM: dts: ci4x10: Adapt to changes in imx6qdl.dtsi regarding fec clocks (git-fixes).\n- ARM: dts: dra7: Fix suspend warning for vpe powerdomain (git-fixes).\n- ARM: dts: exynos: add atmel,24c128 fallback to Samsung EEPROM (git-fixes).\n- ARM: dts: exynos: add missing HDMI supplies on SMDK5250 (git-fixes).\n- ARM: dts: exynos: add missing HDMI supplies on SMDK5420 (git-fixes).\n- ARM: dts: exynos: fix UART3 pins configuration in Exynos5250 (git-fixes).\n- ARM: dts: Fix boot regression on Skomer (git-fixes).\n- ARM: dts: Fix mmc order for omap3-gta04 (git-fixes).\n- ARM: dts: Fix OpenBMC flash layout label addresses (git-fixes).\n- ARM: dts: Fix timer regression for beagleboard revision c (git-fixes).\n- ARM: dts: imx23-evk: Remove MX23_PAD_SSP1_DETECT from hog group (git-fixes).\n- ARM: dts: imx6dl-colibri: Fix I2C pinmuxing (git-fixes).\n- ARM: dts: imx6qdl-apalis: Fix sgtl5000 detection issue (git-fixes).\n- ARM: dts: imx6qdl: correct PU regulator ramp delay (git-fixes).\n- ARM: dts: imx6qdl-udoo: Properly describe the SD card detect (git-fixes).\n- ARM: dts: imx6ull-colibri: fix vqmmc regulator (git-fixes).\n- ARM: dts: imx7: Move hsic_phy power domain to HSIC PHY node (git-fixes).\n- ARM: dts: imx7ulp: Fix \u0027assigned-clocks-parents\u0027 typo (git-fixes).\n- ARM: dts: imx7: Use audio_mclk_post_div instead audio_mclk_root_clk (git-fixes).\n- ARM: dts: imx8mm-venice-gw{71xx,72xx,73xx}: fix OTG controller OC (git-fixes)\n- ARM: dts: imx: Add missing LVDS decoder on M53Menlo (git-fixes).\n- ARM: dts: logicpd-som-lv: Fix wrong pinmuxing on OMAP35 (git-fixes).\n- ARM: dts: meson8b: Fix the UART device-tree schema validation (git-fixes).\n- ARM: dts: meson8: Fix the UART device-tree schema validation (git-fixes).\n- ARM: dts: meson: Fix the UART compatible strings (git-fixes).\n- ARM: dts: ox820: align interrupt controller node name with dtschema (git-fixes).\n- ARM: dts: qcom: fix gic_irq_domain_translate warnings for msm8960 (git-fixes).\n- ARM: dts: qcom: ipq4019: fix sleep clock (git-fixes).\n- ARM: dts: qcom: msm8974: Drop flags for mdss irqs (git-fixes).\n- ARM: dts: qcom: sdx55: fix IPA interconnect definitions (git-fixes).\n- ARM: dts: rockchip: fix a typo on rk3288 crypto-controller (git-fixes).\n- ARM: dts: rockchip: reorder rk322x hmdi clocks (git-fixes).\n- ARM: dts: s5pv210: align DMA channels with dtschema (git-fixes).\n- ARM: dts: s5pv210: Correct interrupt name for bluetooth in Aries (git-fixes).\n- ARM: dts: s5pv210: Remove spi-cs-high on panel in Aries (git-fixes).\n- ARM: dts: socfpga: align interrupt controller node name with dtschema (git-fixes).\n- ARM: dts: socfpga: change qspi to \u0027intel,socfpga-qspi\u0027 (git-fixes).\n- ARM: dts: spear1340: Update serial node properties (git-fixes).\n- ARM: dts: spear13xx: Update SPI dma properties (git-fixes).\n- ARM: dts: stm32: fix AV96 board SAI2 pin muxing on stm32mp15 (git-fixes).\n- ARM: dts: stm32: Fix PHY post-reset delay on Avenger96 (git-fixes).\n- ARM: dts: sun8i: v3s: Move the csi1 block to follow address order (git-fixes).\n- ARM: dts: suniv: F1C100: fix watchdog compatible (git-fixes).\n- ARM: dts: switch timer config to common devkit8000 devicetree (git-fixes).\n- ARM: dts: Use 32KiHz oscillator on devkit8000 (git-fixes).\n- ARM: exynos: Fix refcount leak in exynos_map_pmu (git-fixes).\n- ARM: fix build warning in proc-v7-bugs.c (git-fixes).\n- ARM: fix co-processor register typo (git-fixes).\n- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).\n- ARM: Fix refcount leak in axxia_boot_secondary (git-fixes).\n- ARM: fix Thumb2 regression with Spectre BHB (git-fixes).\n- ARM: ftrace: avoid redundant loads or clobbering IP (git-fixes).\n- ARM: ftrace: ensure that ADR takes the Thumb bit into account (git-fixes).\n- ARM: hisi: Add missing of_node_put after of_find_compatible_node (git-fixes).\n- ARM: iop32x: offset IRQ numbers by 1 (git-fixes).\n- ARM: kprobes: Make space for instruction pointer on stack (bsc#1193277).\n- ARM: mediatek: select arch timer for mt7629 (git-fixes).\n- ARM: meson: Fix refcount leak in meson_smp_prepare_cpus (git-fixes).\n- ARM: mmp: Fix failure to remove sram device (git-fixes).\n- ARM: mstar: Select HAVE_ARM_ARCH_TIMER (git-fixes).\n- ARM: mxs_defconfig: Enable the framebuffer (git-fixes).\n- ARM: omap1: ams-delta: remove camera leftovers (git-fixes).\n- ARM: OMAP1: clock: Fix UART rate reporting algorithm (git-fixes).\n- ARM: OMAP2+: adjust the location of put_device() call in omapdss_init_of (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omap_gic_of_init (git-fixes).\n- ARM: OMAP2+: hwmod: Add of_node_put() before break (git-fixes).\n- ARM: pxa: maybe fix gpio lookup tables (git-fixes).\n- ARM: socfpga: fix missing RESET_CONTROLLER (git-fixes).\n- ARM: Spectre-BHB: provide empty stub for non-config (git-fixes).\n- ARM: tegra: tamonten: Fix I2C3 pad setting (git-fixes).\n- ARM: vexpress/spc: Avoid negative array index when !SMP (git-fixes).\n- ASoC: amd: Fix reference to PCM buffer address (git-fixes).\n- ASoC: amd: vg: fix for pm resume callback sequence (git-fixes).\n- ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe (git-fixes).\n- ASoC: atmel-classd: Remove endianness flag on class d component (git-fixes).\n- ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe (git-fixes).\n- ASoC: atmel: Fix error handling in snd_proto_probe (git-fixes).\n- ASoC: atmel-pdmic: Remove endianness flag on pdmic component (git-fixes).\n- ASoC: atmel: Remove system clock tree configuration for at91sam9g20ek (git-fixes).\n- ASoC: atmel_ssc_dai: Handle errors for clk_enable (git-fixes).\n- ASoC: codecs: Check for error pointer after calling devm_regmap_init_mmio (git-fixes).\n- ASoC: codecs: lpass-rx-macro: fix sidetone register offsets (git-fixes).\n- ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type (git-fixes).\n- ASoC: codecs: rx-macro: fix accessing compander for aux (git-fixes).\n- ASoC: codecs: va-macro: fix accessing array out of bounds for enum type (git-fixes).\n- ASoC: codecs: wc938x: fix accessing array out of bounds for enum type (git-fixes).\n- ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data (git-fixes).\n- ASoC: codecs: wcd934x: do not switch off SIDO Buck when codec is in use (git-fixes).\n- ASoC: codecs: wcd934x: fix kcontrol max values (git-fixes).\n- ASoC: codecs: wcd934x: fix return value of wcd934x_rx_hph_mode_put (git-fixes).\n- ASoC: codecs: wcd938x: fix return value of mixer put function (git-fixes).\n- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).\n- ASoC: cs35l36: Update digital volume TLV (git-fixes).\n- ASoC: cs4265: Fix the duplicated control name (git-fixes).\n- ASoC: cs42l51: Correct minimum value for SX volume control (git-fixes).\n- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).\n- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).\n- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).\n- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).\n- ASoC: da7219: Fix change notifications for tone generator frequency (git-fixes).\n- ASoC: dapm: Do not fold register value changes into notifications (git-fixes).\n- ASoC: dmaengine: do not use a NULL prepare_slave_config() callback (git-fixes).\n- ASoC: dmaengine: Restore NULL prepare_slave_config() callback (git-fixes).\n- ASoC: dwc-i2s: Handle errors for clk_enable (git-fixes).\n- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).\n- ASoC: fsi: Add check for clk_enable (git-fixes).\n- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).\n- ASoC: fsl: Fix refcount leak in imx_sgtl5000_probe (git-fixes).\n- ASoC: fsl_sai: Fix FSL_SAI_xDR/xFR definition (git-fixes).\n- ASoC: fsl_spdif: Disable TX clock when stop (git-fixes).\n- ASoC: fsl: Use dev_err_probe() helper (git-fixes).\n- ASoC: hdmi-codec: Fix OOB memory accesses (git-fixes).\n- ASoC: imx-es8328: Fix error return code in imx_es8328_probe() (git-fixes).\n- ASoC: imx-hdmi: Fix refcount leak in imx_hdmi_probe (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the HP Pro Tablet 408 (git-fixes).\n- ASoC: intel: skylake: Set max DMA segment size (git-fixes).\n- ASoC: Intel: soc-acpi: correct device endpoints for max98373 (git-fixes).\n- ASoC: Intel: sof_sdw: fix quirks for 2022 HP Spectre x360 13\u0027 (git-fixes).\n- ASoC: madera: Add dependencies on MFD (git-fixes).\n- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).\n- ASoC: max98090: Generate notifications on changes for custom control (git-fixes).\n- ASoC: max98090: Move check for invalid values before casting in max98090_put_enab_tlv() (git-fixes).\n- ASoC: max98090: Reject invalid values in custom control put() (git-fixes).\n- ASoC: max98357a: remove dependency on GPIOLIB (git-fixes).\n- ASoC: mediatek: Fix error handling in mt8173_max98090_dev_probe (git-fixes).\n- ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe (git-fixes).\n- ASoC: mediatek: mt6358: add missing EXPORT_SYMBOLs (git-fixes).\n- ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe (git-fixes).\n- ASoC: mediatek: use of_device_get_match_data() (git-fixes).\n- ASoC: meson: Fix event generation for AUI ACODEC mux (git-fixes).\n- ASoC: meson: Fix event generation for AUI CODEC mux (git-fixes).\n- ASoC: meson: Fix event generation for G12A tohdmi mux (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix error handling in pm8916_wcd_analog_spmi_probe (git-fixes).\n- ASoC: msm8916-wcd-digital: Check failure for devm_snd_soc_register_component (git-fixes).\n- ASoC: msm8916-wcd-digital: Fix missing clk_disable_unprepare() in msm8916_wcd_digital_probe (git-fixes).\n- ASoC: mxs: Fix error handling in mxs_sgtl5000_probe (git-fixes).\n- ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe (git-fixes).\n- ASoC: mxs-saif: Handle errors for clk_enable (git-fixes).\n- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_sx() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_xr_sx() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).\n- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).\n- ASoC: ops: Validate input values in snd_soc_put_volsw_range() (git-fixes).\n- ASoC: qcom: Actually clear DMA interrupt register for HDMI (git-fixes).\n- ASoC: rk3328: fix disabling mclk on pclk probe failure (git-fixes).\n- ASoC: rk817: Fix missing clk_disable_unprepare() in rk817_platform_probe (git-fixes).\n- ASoC: rk817: Use devm_clk_get() in rk817_platform_probe (git-fixes).\n- ASoC: rockchip: i2s: Fix missing clk_disable_unprepare() in rockchip_i2s_probe (git-fixes).\n- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_status_clear() (git-fixes).\n- ASoC: rsnd: care return value from rsnd_node_fixed_index() (git-fixes).\n- ASoC: rt1015p: remove dependency on GPIOLIB (git-fixes).\n- ASoC: rt5514: Fix event generation for \u0027DSP Voice Wake Up\u0027 control (git-fixes).\n- ASoC: rt5645: Fix errorenous cleanup order (git-fixes).\n- ASoC: rt5663: check the return value of devm_kzalloc() in rt5663_parse_dp() (git-fixes).\n- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).\n- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).\n- ASoC: samsung: Fix refcount leak in aries_audio_probe (git-fixes).\n- ASoC: samsung: Use dev_err_probe() helper (git-fixes).\n- ASoC: simple-card: fix probe failure on platform component (git-fixes).\n- ASoC: simple-card-utils: Set sysclk on all components (git-fixes).\n- ASoC: soc-compress: Change the check for codec_dai (git-fixes).\n- ASoC: soc-compress: prevent the potentially use of null pointer (git-fixes).\n- ASoC: soc-core: skip zero num_dai component in searching dai name (git-fixes).\n- ASoC: soc-dapm: fix two incorrect uses of list iterator (git-fixes).\n- ASoC: soc-ops: fix error handling (git-fixes).\n- ASoC: SOF: Add missing of_node_put() in imx8m_probe (git-fixes).\n- ASoC: SOF: Fix NULL pointer exception in sof_pci_probe callback (git-fixes).\n- ASoC: SOF: hda: Set max DMA segment size (git-fixes).\n- ASoC: SOF: Intel: enable DMI L1 for playback streams (git-fixes).\n- ASoC: SOF: Intel: Fix build error without SND_SOC_SOF_PCI_DEV (git-fixes).\n- ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM (git-fixes).\n- ASoC: SOF: Intel: match sdw version on link_slaves_found (git-fixes).\n- ASoC: SOF: topology: remove redundant code (git-fixes).\n- ASoC: sti: Fix deadlock via snd_pcm_stop_xrun() call (git-fixes).\n- ASoC: tas2770: Insert post reset delay (git-fixes).\n- ASoC: ti: davinci-i2s: Add check for clk_enable() (git-fixes).\n- ASoC: ti: j721e-evm: Fix refcount leak in j721e_soc_probe_* (git-fixes).\n- ASoC: topology: Allow TLV control to be either read or write (git-fixes).\n- ASoC: topology: Correct error handling in soc_tplg_dapm_widget_create() (git-fixes).\n- ASoC: topology: Optimize soc_tplg_dapm_graph_elems_load behavior (git-fixes).\n- ASoC: tscs454: Add endianness flag in snd_soc_component_driver (git-fixes).\n- ASoC: wm2000: fix missing clk_disable_unprepare() on error in wm2000_anc_transition() (git-fixes).\n- ASoC: wm8350: Handle error for wm8350_register_irq (git-fixes).\n- ASoC: wm8958: Fix change notifications for DSP controls (git-fixes).\n- ASoC: wm8962: Fix suspend while playing music (git-fixes).\n- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).\n- ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting (git-fixes).\n- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).\n- assoc_array: Fix BUG_ON during garbage collect (git-fixes).\n- asus-wmi: Add dgpu disable method (bsc#1198058).\n- asus-wmi: Add egpu enable method (bsc#1198058).\n- asus-wmi: Add panel overdrive functionality (bsc#1198058).\n- asus-wmi: Add support for platform_profile (bsc#1198058).\n- ata: libata: add qc-\u003eflags in ata_qc_complete_template tracepoint (git-fixes).\n- ata: libata-core: Disable READ LOG DMA EXT for Samsung 840 EVOs (git-fixes).\n- ata: libata-core: Disable TRIM on M88V29 (git-fixes).\n- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).\n- ata: libata-transport: fix {dma|pio|xfer}_mode sysfs files (git-fixes).\n- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).\n- ata: pata_hpt37x: fix PCI clock detection (git-fixes).\n- ata: pata_marvell: Check the \u0027bmdma_addr\u0027 beforing reading (git-fixes).\n- ata: pata_octeon_cf: Fix refcount leak in octeon_cf_probe (git-fixes).\n- ata: sata_dwc_460ex: Fix crash due to OOB write (git-fixes).\n- ath10k: Fix error handling in ath10k_setup_msa_resources (git-fixes).\n- ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes).\n- ath10k: skip ath10k_halt during suspend for driver state RESTARTING (git-fixes).\n- ath11k: acquire ab-\u003ebase_lock in unassign when finding the peer by addr (git-fixes).\n- ath11k: disable spectral scan during spectral deinit (git-fixes).\n- ath11k: Do not check arvif-\u003eis_started before sending management frames (git-fixes).\n- ath11k: fix kernel panic during unload/load ath11k modules (git-fixes).\n- ath11k: mhi: use mhi_sync_power_up() (git-fixes).\n- ath11k: pci: fix crash on suspend if board file is not found (git-fixes).\n- ath11k: set correct NL80211_FEATURE_DYNAMIC_SMPS for WCN6855 (git-fixes).\n- ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (git-fixes).\n- ath9k: fix ar9003_get_eepmisc (git-fixes).\n- ath9k: fix QCA9561 PA bias level (git-fixes).\n- ath9k: Fix usage of driver-private space in tx_info (git-fixes).\n- ath9k_htc: fix potential out of bounds access with invalid rxstatus-\u003ers_keyix (git-fixes).\n- ath9k_htc: fix uninit value bugs (git-fixes).\n- ath9k: Properly clear TX status area before reporting to mac80211 (git-fixes).\n- atl1c: fix tx timeout after link flap on Mikrotik 10/25G NIC (git-fixes).\n- atm: eni: Add check for dma_map_single (git-fixes).\n- atm: firestream: check the return value of ioremap() in fs_init() (git-fixes).\n- atomics: Fix atomic64_{read_acquire,set_release} fallbacks (git-fixes).\n- audit: ensure userspace is penalized the same as the kernel when under pressure (git-fixes).\n- audit: improve audit queue handling when \u0027audit=1\u0027 on cmdline (git-fixes).\n- audit: improve robustness of the audit queue handling (git-fixes).\n- auxdisplay: lcd2s: Fix lcd2s_redefine_char() feature (git-fixes).\n- auxdisplay: lcd2s: Fix memory leak in -\u003eremove() (git-fixes).\n- auxdisplay: lcd2s: Use proper API to free the instance of charlcd object (git-fixes).\n- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).\n- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).\n- b43: Fix assigning negative value to unsigned variable (git-fixes).\n- b43legacy: Fix assigning negative value to unsigned variable (git-fixes).\n- bareudp: use ipv6_mod_enabled to check if IPv6 enabled (git-fixes).\n- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).\n- batman-adv: Do not skb_split skbuffs with frag_list (git-fixes).\n- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).\n- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).\n- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).\n- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).\n- bcache: fixup multiple threads crash (git-fixes).\n- bcache: fix use-after-free problem in bcache_device_free() (git-fixes).\n- bcache: improve multithreaded bch_btree_check() (git-fixes).\n- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).\n- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).\n- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).\n- bfq: Allow current waker to defend against a tentative one (bsc#1195915).\n- bfq: Avoid false marking of bic as stably merged (bsc#1197926).\n- bfq: Avoid merging queues with different parents (bsc#1197926).\n- bfq: Do not let waker requests skip proper accounting (bsc#1184318).\n- bfq: Drop pointless unlock-lock pair (bsc#1197926).\n- bfq: Fix warning in bfqq_request_over_limit() (bsc#1200812).\n- bfq: Get rid of __bio_blkcg() usage (bsc#1197926).\n- bfq: Limit number of requests consumed by each cgroup (bsc#1184318).\n- bfq: Limit waker detection in time (bsc#1184318).\n- bfq: Make sure bfqg for which we are queueing requests is online (bsc#1197926).\n- bfq: Relax waker detection for shared queues (bsc#1184318).\n- bfq: Remove pointless bfq_init_rq() calls (bsc#1197926).\n- bfq: Split shared queues on move between cgroups (bsc#1197926).\n- bfq: Store full bitmap depth in bfq_data (bsc#1184318).\n- bfq: Track number of allocated requests in bfq_entity (bsc#1184318).\n- bfq: Track whether bfq_group is still online (bsc#1197926).\n- bfq: Update cgroup information before merging bio (bsc#1197926).\n- binfmt_flat: do not stop relocating GOT entries prematurely on riscv (git-fixes).\n- bitfield: add explicit inclusions to the example (git-fixes).\n- blkcg: Remove extra blkcg_bio_issue_init (bsc#1194585).\n- blk-cgroup: move blkcg_{get,set}_fc_appid out of line (bsc#1200045).\n- blk-cgroup: set blkg iostat after percpu stat aggregation (bsc#1198018).\n- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).\n- blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release() (bsc#1198034).\n- blk-mq: do not touch -\u003etagset in blk_mq_get_sq_hctx (bsc#1200824).\n- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).\n- blk-mq: fix tag_get wait task can\u0027t be awakened (bsc#1200263).\n- blk-mq: Fix wrong wakeup batch configuration which will cause hang (bsc#1200263).\n- blktrace: fix use after free for struct blk_trace (bsc#1198017).\n- block: assign bi_bdev for cloned bios in blk_rq_prep_clone (bsc#1198016).\n- block: avoid to quiesce queue in elevator_init_mq (bsc#1198013).\n- block, bfq: fix UAF problem in bfqg_stats_init() (bsc#1194583).\n- block: bio-integrity: Advance seed correctly for larger interval sizes (git-fixes).\n- block: Check ADMIN before NICE for IOPRIO_CLASS_RT (bsc#1198012).\n- block: do not delete queue kobject before its children (bsc#1198019).\n- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).\n- block: fix async_depth sysfs interface for mq-deadline (bsc#1198015).\n- block: fix bio_clone_blkg_association() to associate with proper blkcg_gq (bsc#1200259).\n- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (git-fixes).\n- block: fix ioprio_get(IOPRIO_WHO_PGRP) vs setuid(2) (bsc#1194586).\n- block: Fix the maximum minor value is blk_alloc_ext_minor() (bsc#1198021).\n- block: Fix up kabi after blkcg merge fix (bsc#1198020).\n- block: Hold invalidate_lock in BLKRESETZONE ioctl (bsc#1198010).\n- block: limit request dispatch loop duration (bsc#1198022).\n- block/mq-deadline: Improve request accounting further (bsc#1198009).\n- block: Provide blk_mq_sched_get_icq() (bsc#1184318).\n- block: update io_ticks when io hang (bsc#1197817).\n- block/wbt: fix negative inflight counter when remove scsi device (bsc#1197819).\n- Bluetooth: btintel: Fix WBS setting for Intel legacy ROM products (git-fixes).\n- Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt (git-fixes).\n- Bluetooth: btusb: Add another Realtek 8761BU (git-fixes).\n- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).\n- Bluetooth: btusb: Add one more Bluetooth part for the Realtek RTL8852AE (git-fixes).\n- Bluetooth: btusb: Whitespace fixes for btusb_setup_csr() (git-fixes).\n- Bluetooth: call hci_le_conn_failed with hdev lock in hci_le_conn_failed (git-fixes).\n- Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout (git-fixes).\n- Bluetooth: Fix not checking for valid hdev on bt_dev_{info,warn,err,dbg} (git-fixes).\n- Bluetooth: Fix the creation of hdev-\u003ename (git-fixes).\n- Bluetooth: Fix use after free in hci_send_acl (git-fixes).\n- Bluetooth: hci_qca: Use del_timer_sync() before freeing (git-fixes).\n- Bluetooth: hci_serdev: call init_rwsem() before p-\u003eopen() (git-fixes).\n- Bluetooth: use hdev lock for accept_list and reject_list in conn req (git-fixes).\n- Bluetooth: use hdev lock in activate_scan for hci_is_adv_monitoring (git-fixes).\n- Bluetooth: use memset avoid memory leaks (git-fixes).\n- bnx2x: fix napi API usage sequence (bsc#1198217).\n- bnxt_en: Do not destroy health reporters during reset (bsc#1199736).\n- bnxt_en: Eliminate unintended link toggle during FW reset (bsc#1199736).\n- bnxt_en: Fix active FEC reporting to ethtool (git-fixes).\n- bnxt_en: Fix devlink fw_activate (jsc#SLE-18978).\n- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).\n- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).\n- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).\n- bnxt_en: Fix possible bnxt_open() failure caused by wrong RFS flag (git-fixes).\n- bnxt_en: Fix unnecessary dropping of RX packets (git-fixes).\n- bnxt_en: Increase firmware message response DMA wait time (git-fixes).\n- bnxt_en: Prevent XDP redirect from running when stopping TX queue (git-fixes).\n- bnxt_en: reserve space inside receive page for skb_shared_info (git-fixes).\n- bnxt_en: Restore the resets_reliable flag in bnxt_open() (jsc#SLE-18978).\n- bnxt_en: Synchronize tx when xdp redirects happen on same ring (git-fixes).\n- bonding: fix data-races around agg_select_timer (git-fixes).\n- bonding: force carrier update when releasing slave (git-fixes).\n- bonding: pair enable_port with slave_arr_updates (git-fixes).\n- bpf: Add check_func_arg_reg_off function (git-fixes).\n- bpf: add config to allow loading modules with BTF mismatches (bsc#1194501).\n- bpf: Avoid races in __bpf_prog_run() for 32bit arches (git-fixes).\n- bpf: Disallow negative offset in check_ptr_off_reg (git-fixes).\n- bpf: Fix comment for helper bpf_current_task_under_cgroup() (git-fixes).\n- bpf: Fix kernel address leakage in atomic cmpxchg\u0027s r0 aux reg (git-fixes).\n- bpf: Fix PTR_TO_BTF_ID var_off check (git-fixes).\n- bpf: Fix UAF due to race between btf_try_get_module and load_module (git-fixes).\n- bpf: Mark PTR_TO_FUNC register initially with zero offset (git-fixes).\n- bpf: Resolve to prog-\u003eaux-\u003edst_prog-\u003etype only for BPF_PROG_TYPE_EXT (git-fixes).\n- bpf: selftests: adapt bpf_iter_task_vma to get_inode_dev() (bsc#927455 bsc#1198585).\n- bpf, selftests: Fix racing issue in btf_skc_cls_ingress test (git-fixes).\n- bpf, selftests: Update test case for atomic cmpxchg on r0 with pointer (git-fixes).\n- bpftool: Fix memory leak in prog_dump() (git-fixes).\n- bpftool: Remove inclusion of utilities.mak from Makefiles (git-fixes).\n- bpftool: Remove unused includes to bpf/bpf_gen_internal.h (git-fixes).\n- bpftool: Remove useless #include to perf-sys.h from map_perf_ring.c (git-fixes).\n- brcmfmac: firmware: Allocate space for default boardrev in nvram (git-fixes).\n- brcmfmac: firmware: Fix crash in brcm_alt_fw_path (git-fixes).\n- brcmfmac: pcie: Declare missing firmware files in pcie.c (git-fixes).\n- brcmfmac: pcie: Fix crashes due to early IRQs (git-fixes).\n- brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path (git-fixes).\n- brcmfmac: pcie: Replace brcmf_pcie_copy_mem_todev with memcpy_toio (git-fixes).\n- brcmfmac: sdio: Fix undefined behavior due to shift overflowing the constant (git-fixes).\n- btrfs: add a BTRFS_FS_ERROR helper (bsc#1197915).\n- btrfs: add btrfs_set_item_*_nr() helpers (bsc#1197915).\n- btrfs: add helper to truncate inode items when logging inode (bsc#1197915).\n- btrfs: add missing run of delayed items after unlink during log replay (bsc#1197915).\n- btrfs: add ro compat flags to inodes (bsc#1197915).\n- btrfs: always update the logged transaction when logging new names (bsc#1197915).\n- btrfs: assert that extent buffers are write locked instead of only locked (bsc#1197915).\n- btrfs: avoid attempt to drop extents when logging inode for the first time (bsc#1197915).\n- btrfs: avoid expensive search when dropping inode items from log (bsc#1197915).\n- btrfs: avoid expensive search when truncating inode items from the log (bsc#1197915).\n- btrfs: Avoid live-lock in search_ioctl() on hardware with sub-page (git-fixes)\n- btrfs: avoid search for logged i_size when logging inode if possible (bsc#1197915).\n- btrfs: avoid unnecessarily logging directories that had no changes (bsc#1197915).\n- btrfs: avoid unnecessary lock and leaf splits when updating inode in the log (bsc#1197915).\n- btrfs: avoid unnecessary log mutex contention when syncing log (bsc#1197915).\n- btrfs: change error handling for btrfs_delete_*_in_log (bsc#1197915).\n- btrfs: change handle_fs_error in recover_log_trees to aborts (bsc#1197915).\n- btrfs: check if a log tree exists at inode_logged() (bsc#1197915).\n- btrfs: constify and cleanup variables in comparators (bsc#1197915).\n- btrfs: do not commit delayed inode when logging a file in full sync mode (bsc#1197915).\n- btrfs: do not log new dentries when logging that a new name exists (bsc#1197915).\n- btrfs: do not pin logs too early during renames (bsc#1197915).\n- btrfs: drop the _nr from the item helpers (bsc#1197915).\n- btrfs: eliminate some false positives when checking if inode was logged (bsc#1197915).\n- btrfs: factor out the copying loop of dir items from log_dir_items() (bsc#1197915).\n- btrfs: fix lost prealloc extents beyond eof after full fsync (bsc#1197915).\n- btrfs: fix lzo_decompress_bio() kmap leakage (bsc#1193852).\n- btrfs: fix memory leak in __add_inode_ref() (bsc#1197915).\n- btrfs: fix missing last dir item offset update when logging directory (bsc#1197915).\n- btrfs: fix re-dirty process of tree-log nodes (bsc#1197915).\n- btrfs: improve the batch insertion of delayed items (bsc#1197915).\n- btrfs: insert items in batches when logging a directory when possible (bsc#1197915).\n- btrfs: introduce btrfs_lookup_match_dir (bsc#1197915).\n- btrfs: introduce item_nr token variant helpers (bsc#1197915).\n- btrfs: keep track of the last logged keys when logging a directory (bsc#1197915).\n- btrfs: loop only once over data sizes array when inserting an item batch (bsc#1197915).\n- btrfs: make btrfs_file_extent_inline_item_len take a slot (bsc#1197915).\n- btrfs: only copy dir index keys when logging a directory (bsc#1197915).\n- btrfs: remove no longer needed checks for NULL log context (bsc#1197915).\n- btrfs: remove no longer needed full sync flag check at inode_logged() (bsc#1197915).\n- btrfs: remove no longer needed logic for replaying directory deletes (bsc#1197915).\n- btrfs: remove redundant log root assignment from log_dir_items() (bsc#1197915).\n- btrfs: remove root argument from add_link() (bsc#1197915).\n- btrfs: remove root argument from btrfs_log_inode() and its callees (bsc#1197915).\n- btrfs: remove root argument from btrfs_unlink_inode() (bsc#1197915).\n- btrfs: remove root argument from check_item_in_log() (bsc#1197915).\n- btrfs: remove root argument from drop_one_dir_item() (bsc#1197915).\n- btrfs: remove the btrfs_item_end() helper (bsc#1197915).\n- btrfs: remove unnecessary list head initialization when syncing log (bsc#1197915).\n- btrfs: remove unneeded return variable in btrfs_lookup_file_extent (bsc#1197915).\n- btrfs: rename btrfs_item_end_nr to btrfs_item_data_end (bsc#1197915).\n- btrfs: stop doing GFP_KERNEL memory allocations in the ref verify tool (bsc#1197915).\n- btrfs: unexport setup_items_for_insert() (bsc#1197915).\n- btrfs: unify lookup return value when dir entry is missing (bsc#1197915).\n- btrfs: update comment at log_conflicting_inodes() (bsc#1197915).\n- btrfs: use btrfs_item_size_nr/btrfs_item_offset_nr everywhere (bsc#1197915).\n- btrfs: use btrfs_next_leaf instead of btrfs_next_item when slots \u003e nritems (bsc#1197915).\n- btrfs: use single bulk copy operations when logging directories (bsc#1197915).\n- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).\n- bus: sunxi-rsb: Fix the return value of sunxi_rsb_device_create() (git-fixes).\n- bus: ti-sysc: Fix warnings for unbind for serial (git-fixes).\n- bus: ti-sysc: Make omap3 gpt12 quirk handling SoC specific (git-fixes).\n- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).\n- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).\n- can: etas_es58x: change opened_channel_cnt\u0027s type from atomic_t to u8 (git-fixes).\n- can: etas_es58x: es58x_fd_rx_event_msg(): initialize rx_event_msg before calling es58x_check_msg_len() (git-fixes).\n- can: grcan: grcan_close(): fix deadlock (git-fixes).\n- can: grcan: grcan_probe(): fix broken system id check for errata workaround needs (git-fixes).\n- can: grcan: only use the NAPI poll budget for RX (git-fixes).\n- can: grcan: use ofdev-\u003edev when allocating DMA memory (git-fixes).\n- can: gs_usb: change active_channels\u0027s type from atomic_t to u8 (git-fixes).\n- can: isotp: fix error path in isotp_sendmsg() to unlock wait queue (git-fixes).\n- can: isotp: fix potential CAN frame reception race in isotp_rcv() (git-fixes).\n- can: isotp: restore accidentally removed MSG_PEEK feature (git-fixes).\n- can: isotp: return -EADDRNOTAVAIL when reading from unbound socket (git-fixes).\n- can: isotp: set default value for N_As to 50 micro seconds (git-fixes).\n- can: isotp: stop timeout monitoring when no first frame was sent (git-fixes).\n- can: isotp: support MSG_TRUNC flag when reading from socket (git-fixes).\n- can: m_can: m_can_tx_handler(): fix use after free of skb (git-fixes).\n- can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path (git-fixes).\n- can: mcba_usb: properly check endpoint type (git-fixes).\n- can: mcp251xfd: mcp251xfd_register_get_dev_id(): fix return of error value (git-fixes).\n- can: mcp251xfd: silence clang\u0027s -Wunaligned-access warning (git-fixes).\n- can: rcar_canfd: rcar_canfd_channel_probe(): register the CAN device when fully ready (git-fixes).\n- can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).\n- can: xilinx_can: mark bit timing constants as const (git-fixes).\n- carl9170: fix missing bit-wise or operator for tx_params (git-fixes).\n- carl9170: tx: fix an incorrect use of list iterator (git-fixes).\n- CDC-NCM: avoid overflow in sanity checking (git-fixes).\n- ceph: fix setting of xattrs on async created inodes (bsc#1199611).\n- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).\n- cfg80211: declare MODULE_FIRMWARE for regulatory.db (git-fixes).\n- cfg80211: do not add non transmitted BSS to 6GHz scanned channels (git-fixes).\n- cfg80211: fix race in netlink owner interface destruction (git-fixes).\n- cfg80211: hold bss_lock while updating nontrans_list (git-fixes).\n- cgroup/cpuset: Fix a race between cpuset_attach() and cpu hotplug (bsc#1196869).\n- cgroup/cpuset: Fix \u0027suspicious RCU usage\u0027 lockdep warning (bsc#1196868).\n- cgroup/cpuset: Remove cpus_allowed/mems_allowed setup in cpuset_init_smp() (bsc#1199839).\n- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).\n- char: tpm: cr50_i2c: Suppress duplicated error message in .remove() (git-fixes).\n- char: xillybus: fix a refcount leak in cleanup_dev() (git-fixes).\n- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1193629).\n- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1193629).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1193629).\n- cifs: avoid parallel session setups on same channel (bsc#1193629).\n- cifs: avoid race during socket reconnect between send and recv (bsc#1193629).\n- cifs: call cifs_reconnect when a connection is marked (bsc#1193629).\n- cifs: call helper functions for marking channels for reconnect (bsc#1193629).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1193629).\n- cifs: check for smb1 in open_cached_dir() (bsc#1193629).\n- cifs: check reconnects for channels of active tcons too (bsc#1193629).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1193629).\n- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1193629).\n- cifs: clean up an inconsistent indenting (bsc#1193629).\n- cifs: convert the path to utf16 in smb2_query_info_compound (bsc#1193629).\n- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1193629).\n- cifs: do not build smb1ops if legacy support is disabled (bsc#1193629).\n- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1193629).\n- cifs: do not skip link targets when an I/O fails (bsc#1194625).\n- cifs: do not use tcpStatus after negotiate completes (bsc#1193629).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1193629).\n- cifs: fix bad fids sent over wire (bsc#1197157).\n- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1193629).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1193629).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1193629).\n- cifs: fix handlecache and multiuser (bsc#1193629).\n- cifs: fix hang on cifs_get_next_mid() (bsc#1193629).\n- cifs: fix incorrect use of list iterator after the loop (bsc#1193629).\n- cifs: fix minor compile warning (bsc#1193629).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1193629).\n- cifs: fix potential deadlock in direct reclaim (bsc#1193629).\n- cifs: fix potential double free during failed mount (bsc#1193629).\n- cifs: fix potential race with cifsd thread (bsc#1193629).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1193629).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1193629).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1193629).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1193629).\n- cifs: fix the connection state transitions with multichannel (bsc#1193629).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1193629).\n- cifs: fix workstation_name for multiuser mounts (bsc#1193629).\n- cifs: force new session setup and tcon for dfs (bsc#1193629).\n- cifs: free ntlmsspblob allocated in negotiate (bsc#1193629).\n- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1193629).\n- cifs: make status checks in version independent callers (bsc#1193629).\n- cifs: mark sessions for reconnection in helper function (bsc#1193629).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1193629).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1193629).\n- cifs: move superblock magic defitions to magic.h (bsc#1193629).\n- cifs: potential buffer overflow in handling symlinks (bsc#1193629).\n- cifs: print TIDs as hex (bsc#1193629).\n- cifs: protect all accesses to chan_* with chan_lock (bsc#1193629).\n- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1193629).\n- cifs: reconnect only the connection and not smb session where possible (bsc#1193629).\n- cifs: release cached dentries only if mount is complete (bsc#1193629).\n- cifs: remove check of list iterator against head past the loop body (bsc#1193629).\n- cifs: remove redundant assignment to pointer p (bsc#1193629).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1193629).\n- cifs: remove repeated state change in dfs tree connect (bsc#1193629).\n- cifs: remove unused variable ses_selected (bsc#1193629).\n- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1193629).\n- cifs: return the more nuanced writeback error on close() (bsc#1193629).\n- cifs: serialize all mount attempts (bsc#1193629).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1193629).\n- cifs: skip trailing separators of prefix paths (bsc#1193629).\n- cifs: smbd: fix typo in comment (bsc#1193629).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1193629).\n- cifs: take cifs_tcp_ses_lock for status checks (bsc#1193629).\n- cifs: track individual channel status using chans_need_reconnect (bsc#1193629).\n- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1193629).\n- cifs: update internal module number (bsc#1193629).\n- cifs: update tcpStatus during negotiate and sess setup (bsc#1193629).\n- cifs: use a different reconnect helper for non-cifsd threads (bsc#1193629).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1193629).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1193629).\n- cifs: use new enum for ses_status (bsc#1193629).\n- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1193629).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1193629).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1193629).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1193629).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1193629).\n- cifs: writeback fix (bsc#1193629).\n- clk: actions: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: at91: generated: consider range when calculating best rate (git-fixes).\n- clk: at91: sama7g5: fix parents of PDMCs\u0027 GCLK (git-fixes).\n- clk: bcm2835: fix bcm2835_clock_choose_div (git-fixes).\n- clk: bcm2835: Remove unused variable (git-fixes).\n- clk: clps711x: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: Enforce that disjoints limits are invalid (git-fixes).\n- clk: Fix clk_hw_get_clk() when dev is NULL (git-fixes).\n- clk: hisilicon: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: imx7d: Remove audio_mclk_root_clk (git-fixes).\n- clk: imx8mp: fix usb_root_clk parent (git-fixes).\n- clk: imx: Add check for kcalloc (git-fixes).\n- clk: imx: off by one in imx_lpcg_parse_clks_from_dt() (git-fixes).\n- clk: imx: scu: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes).\n- clk: Initialize orphan req_rate (git-fixes).\n- clk: jz4725b: fix mmc0 clock gating (git-fixes).\n- clk: loongson1: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: nxp: Remove unused variable (git-fixes).\n- clk: qcom: clk-rcg2: Update logic to calculate D value for RCG (git-fixes).\n- clk: qcom: clk-rcg2: Update the frac table for pixel clock (git-fixes).\n- clk: qcom: gcc-msm8994: Fix gpll4 width (git-fixes).\n- clk: qcom: ipq8074: fix PCI-E clock oops (git-fixes).\n- clk: qcom: ipq8074: Use floor ops for SDCC1 clock (git-fixes).\n- clk: renesas: r9a06g032: Fix the RTC hclock description (git-fixes).\n- clk: rockchip: drop CLK_SET_RATE_PARENT from dclk_vop* on rk3568 (git-fixes).\n- clk: si5341: fix reported clk_rate when output divider is 2 (git-fixes).\n- clk: sunxi: sun9i-mmc: check return value after calling platform_get_resource() (git-fixes).\n- clk: tegra: Add missing reset deassertion (git-fixes).\n- clk: tegra: tegra124-emc: Fix missing put_device() call in emc_ensure_emc_driver (git-fixes).\n- clk: ti: Preserve node in ti_dt_clocks_register() (git-fixes).\n- clk: uniphier: Fix fixed-rate initialization (git-fixes).\n- clocksource: acpi_pm: fix return value of __setup handler (git-fixes).\n- clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts (git-fixes).\n- clocksource/drivers/exynos_mct: Refactor resources allocation (git-fixes).\n- clocksource/drivers/oxnas-rps: Fix irq_of_parse_and_map() return value (git-fixes).\n- clocksource/drivers/sp804: Avoid error on multiple instances (git-fixes).\n- clocksource/drivers/timer-microchip-pit64b: Use notrace (git-fixes).\n- clocksource/drivers/timer-of: Check return value of of_iomap in timer_of_base_init() (git-fixes).\n- clocksource/drivers/timer-ti-dm: Fix regression from errata i940 fix (git-fixes).\n- clocksource: hyper-v: unexport __init-annotated hv_init_clocksource() (bsc#1201218).\n- comedi: drivers: ni_routes: Use strcmp() instead of memcmp() (git-fixes).\n- comedi: vmk80xx: fix expression for tx buffer size (git-fixes).\n- copy_process(): Move fd_install() out of sighand-\u003esiglock critical section (bsc#1199626).\n- cpufreq-fix-memory-leak-in-sun50i_cpufreq_nvmem_prob.patch: (git-fixes).\n- cpufreq: intel_pstate: Add Ice Lake server to out-of-band IDs (bsc#1201228).\n- cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse (git-fixes).\n- cpuidle,intel_idle: Fix CPUIDLE_FLAG_IRQ_ENABLE (git-fixes).\n- cpuidle: intel_idle: Update intel_idle() kerneldoc comment (git-fixes).\n- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).\n- cputime, cpuacct: Include guest time in user time in (git-fixes)\n- crypto: amlogic - call finalize with bh disabled (git-fixes).\n- crypto: api - Move cryptomgr soft dependency into algapi (git-fixes).\n- crypto: arm/aes-neonbs-cbc - Select generic cbc and aes (git-fixes).\n- crypto: authenc - Fix sleep in atomic context in decrypt_tail (git-fixes).\n- crypto: caam - fix i.MX6SX entropy delay value (git-fixes).\n- crypto: cavium/nitrox - do not cast parameter in bit operations (git-fixes).\n- crypto: ccp - ccp_dmaengine_unregister release dma channels (git-fixes).\n- crypto: ccree - do not attempt 0 len DMA mappings (git-fixes).\n- crypto: ccree - Fix use after free in cc_cipher_exit() (git-fixes).\n- crypto: ccree - use fine grained DMA mapping dir (git-fixes).\n- crypto: cryptd - Protect per-CPU resource by disabling BH (git-fixes).\n- crypto: ecrdsa - Fix incorrect use of vli_cmp (git-fixes).\n- crypto: engine - check if BH is disabled during completion (git-fixes).\n- crypto: gemini - call finalize with bh disabled (git-fixes).\n- crypto: hisilicon/qm - cleanup warning in qm_vf_read_qos (git-fixes).\n- crypto: hisilicon/sec - fix the aead software fallback for engine (git-fixes).\n- crypto: hisilicon/sec - not need to enable sm4 extra mode at HW V3 (git-fixes).\n- crypto: marvell/cesa - ECB does not IV (git-fixes).\n- crypto: mxs-dcp - Fix scatterlist processing (git-fixes).\n- crypto: octeontx2 - remove CONFIG_DM_CRYPT check (git-fixes).\n- crypto: qat - disable registration of algorithms (git-fixes).\n- crypto: qat - do not cast parameter in bit operations (git-fixes).\n- crypto: qcom-rng - ensure buffer for generate is completely filled (git-fixes).\n- crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ (git-fixes).\n- crypto: rockchip - ECB does not need IV (git-fixes).\n- crypto: rsa-pkcs1pad - correctly get hash from source scatterlist (git-fixes).\n- crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() (git-fixes).\n- crypto: rsa-pkcs1pad - only allow with rsa (git-fixes).\n- crypto: rsa-pkcs1pad - restore signature length check (git-fixes).\n- crypto: stm32 - fix reference leak in stm32_crc_remove (git-fixes).\n- crypto: sun8i-ce - call finalize with bh disabled (git-fixes).\n- crypto: sun8i-ss - call finalize with bh disabled (git-fixes).\n- crypto: sun8i-ss - handle zero sized sg (git-fixes).\n- crypto: sun8i-ss - really disable hash on A80 (git-fixes).\n- crypto: sun8i-ss - rework handling of IV (git-fixes).\n- crypto: vmx - add missing dependencies (git-fixes).\n- crypto: x86/chacha20 - Avoid spurious jumps to other functions (git-fixes).\n- crypto: x86 - eliminate anonymous module_init and module_exit (git-fixes).\n- crypto: xts - Add softdep on ecb (git-fixes).\n- dax: fix cache flush on PMD-mapped pages (bsc#1200830).\n- devlink: Add \u0027enable_iwarp\u0027 generic device param (bsc#1200502).\n- dim: initialize all struct fields (git-fixes).\n- display/amd: decrease message verbosity about watermarks table failure (git-fixes).\n- dma: at_xdmac: fix a missing check on list iterator (git-fixes).\n- dma-buf: fix use of DMA_BUF_SET_NAME_{A,B} in userspace (git-fixes).\n- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).\n- dma-debug: fix return value of __setup handlers (git-fixes).\n- dma-direct: avoid redundant memory sync for swiotlb (git-fixes).\n- dmaengine: dw-edma: Fix unaligned 64bit access (git-fixes).\n- dmaengine: hisi_dma: fix MSI allocate fail when reload hisi_dma (git-fixes).\n- dmaengine: idxd: add missing callback function to support DMA_INTERRUPT (git-fixes).\n- dmaengine: idxd: add RO check for wq max_batch_size write (git-fixes).\n- dmaengine: idxd: add RO check for wq max_transfer_size write (git-fixes).\n- dmaengine: idxd: check GENCAP config support for gencfg register (git-fixes).\n- dmaengine: idxd: fix device cleanup on disable (git-fixes).\n- dmaengine: idxd: Fix the error handling path in idxd_cdev_register() (git-fixes).\n- dmaengine: idxd: restore traffic class defaults after wq reset (git-fixes).\n- dmaengine: idxd: set DMA_INTERRUPT cap bit (git-fixes).\n- dmaengine: idxd: skip clearing device context when device is read-only (git-fixes).\n- dmaengine: imx-sdma: Fix error checking in sdma_event_remap (git-fixes).\n- dmaengine: mediatek:Fix PM usage reference leak of mtk_uart_apdma_alloc_chan_resources (git-fixes).\n- dmaengine: ptdma: fix concurrency issue with multiple dma transfer (jsc#SLE-21315).\n- dmaengine: ptdma: Fix the error handling path in pt_core_init() (git-fixes).\n- dmaengine: ptdma: handle the cases based on DMA is complete (jsc#SLE-21315).\n- dmaengine: Revert \u0027dmaengine: shdma: Fix runtime PM imbalance on error\u0027 (git-fixes).\n- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).\n- dmaengine: sh: rcar-dmac: Check for error num after dma_set_max_seg_size (git-fixes).\n- dmaengine: sh: rcar-dmac: Check for error num after setting mask (git-fixes).\n- dmaengine: stm32-dmamux: Fix PM disable depth imbalance in stm32_dmamux_probe (git-fixes).\n- dmaengine: stm32-mdma: fix chan initialization in stm32_mdma_irq_handler() (git-fixes).\n- dmaengine: stm32-mdma: remove GISR1 register (git-fixes).\n- dmaengine: zynqmp_dma: In struct zynqmp_dma_chan fix desc_size data type (git-fixes).\n- dma-mapping: remove bogus test for pfn_valid from dma_map_resource (git-fixes).\n- dma/pool: create dma atomic pool only if dma zone has managed pages (bsc#1197501).\n- dm crypt: fix get_key_size compiler warning if !CONFIG_KEYS (git-fixes).\n- dm: fix use-after-free in dm_cleanup_zoned_dev() (git-fixes).\n- dm integrity: fix error code in dm_integrity_ctr() (git-fixes).\n- dm integrity: set journal entry unused when shrinking device (git-fixes).\n- dm mirror log: round up region bitmap size to BITS_PER_LONG (git-fixes).\n- dm mpath: only use ktime_get_ns() in historical selector (git-fixes).\n- dm verity: set DM_TARGET_IMMUTABLE feature flag (git-fixes).\n- doc/ip-sysctl: add bc_forwarding (git-fixes).\n- docs/conf.py: Cope with removal of language=None in Sphinx 5.0.0 (git-fixes).\n- Documentation: add link to stable release candidate tree (git-fixes).\n- Documentation: dd: Use ReST lists for return values of driver_deferred_probe_check_state() (git-fixes).\n- Documentation: Fix duplicate statement about raw_spinlock_t type (git-fixes).\n- Documentation: update stable tree link (git-fixes).\n- do not call utsname() after -\u003ensproxy is NULL (bsc#1201196).\n- drbd: fix an invalid memory access caused by incorrect use of list iterator (git-fixes).\n- drbd: fix duplicate array initializer (git-fixes).\n- drbd: Fix five use after free bugs in get_initial_state (git-fixes).\n- drbd: remove assign_p_sizes_qlim (git-fixes).\n- drbd: use bdev_alignment_offset instead of queue_alignment_offset (git-fixes).\n- drbd: use bdev based limit helpers in drbd_send_sizes (git-fixes).\n- driver base: fix an unlikely reference counting issue in __add_memory_block() (git-fixes).\n- driver base: fix compaction sysfs file leak (git-fixes).\n- driver: base: fix UAF when driver_attach failed (git-fixes).\n- driver core: dd: fix return value of __setup handler (git-fixes).\n- driver core: fix deadlock in __device_attach (git-fixes).\n- driver core: Fix wait_for_device_probe() and deferred_probe_timeout interaction (git-fixes).\n- driver core: Free DMA range map when device is released (git-fixes).\n- driver: hv: Compare cpumasks and not their weights in init_vp_index() (git-fixes).\n- driver: hv: log when enabling crash_kexec_post_notifiers (git-fixes).\n- driver: hv: Rename \u0027alloced\u0027 to \u0027allocated\u0027 (git-fixes).\n- driver: hv: utils: Make use of the helper macro LIST_HEAD() (git-fixes).\n- driver: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (git-fixes).\n- driver: hv: vmbus: Fix potential crash on module unload (git-fixes).\n- driver: hv: vmbus: Use struct_size() helper in kmalloc() (git-fixes).\n- driver: i2c: thunderx: Allow driver to work with ACPI defined TWSI controllers (git-fixes).\n- driver: net: xgene: Fix regression in CRC stripping (git-fixes).\n- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).\n- drivers: mmc: sdhci_am654: Add the quirk to set TESTCD bit (git-fixes).\n- drivers: staging: rtl8192bs: Fix deadlock in rtw_joinbss_event_prehandle() (git-fixes).\n- drivers: staging: rtl8192e: Fix deadlock in rtllib_beacons_stop() (git-fixes).\n- drivers: staging: rtl8192u: Fix deadlock in ieee80211_beacons_stop() (git-fixes).\n- drivers: staging: rtl8723bs: Fix deadlock in rtw_surveydone_event_callback() (git-fixes).\n- drivers: tty: serial: Fix deadlock in sa1100_set_termios() (git-fixes).\n- drivers: usb: host: Fix deadlock in oxu_bus_suspend() (git-fixes).\n- drm: add a locked version of drm_is_current_master (git-fixes).\n- drm: Add orientation quirk for GPD Win Max (git-fixes).\n- drm/amd: Add USBC connector ID (git-fixes).\n- drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj (git-fixes).\n- drm/amd: avoid suspend on dGPUs w/ s2idle support when runtime PM enabled (git-fixes).\n- drm/amd: Check if ASPM is enabled from PCIe subsystem (git-fixes).\n- drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug (git-fixes).\n- drm/amd/display: Add pstate verification and recovery for DCN31 (git-fixes).\n- drm/amd/display: Add signal type check when verify stream backends same (git-fixes).\n- drm/amd/display: Avoid reading audio pattern past AUDIO_CHANNELS_COUNT (git-fixes).\n- drm/amd/display: Cap OLED brightness per max frame-average luminance (git-fixes).\n- drm/amd/display: Cap pflip irqs per max otg number (git-fixes).\n- drm/amd/display: Check if modulo is 0 before dividing (git-fixes).\n- drm/amd/display: DCN3.1: do not mark as kernel-doc (git-fixes).\n- drm/amd/display: Disabling Z10 on DCN31 (git-fixes).\n- drm/amd/display: do not ignore alpha property on pre-multiplied mode (git-fixes).\n- drm/amd/display: Do not reinitialize DMCUB on s0ix resume (git-fixes).\n- drm/amd/display: Enable power gating before init_pipes (git-fixes).\n- drm/amd/display: FEC check in timing validation (git-fixes).\n- drm/amd/display: Fix allocate_mst_payload assert on resume (git-fixes).\n- drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() (git-fixes).\n- drm/amd/display: fix audio format not updated after edid updated (git-fixes).\n- drm/amd/display: Fix memory leak (git-fixes).\n- drm/amd/display: Fix memory leak in dcn21_clock_source_create (bsc#1190786)\n- drm/amd/display: Fix OLED brightness control on eDP (git-fixes).\n- drm/amd/display: Fix p-state allow debug index on dcn31 (git-fixes).\n- drm/amd/display: fix yellow carp wm clamping (git-fixes).\n- drm/amd/display: Force link_rate as LINK_RATE_RBR2 for 2018 15\u0027 Apple Retina panels (git-fixes).\n- drm/amd/display: For vblank_disable_immediate, check PSR is really used (git-fixes).\n- drm/amd/display: Protect update_bw_bounding_box FPU code (git-fixes).\n- drm/amd/display: Read Golden Settings Table from VBIOS (git-fixes).\n- drm/amd/display: Remove vupdate_int_entry definition (git-fixes).\n- drm/amd/display: Revert FEC check in validation (git-fixes).\n- drm/amd/display: Update VTEM Infopacket definition (git-fixes).\n- drm/amd/display: Update watermark values for DCN301 (git-fixes).\n- drm/amd/display: Use adjusted DCN301 watermarks (git-fixes).\n- drm/amd/display: Use PSR version selected during set_psr_caps (git-fixes).\n- drm/amd/display: watermark latencies is not enough on DCN31 (git-fixes).\n- drm/amdgpu: add beige goby PCI ID (git-fixes).\n- drm/amdgpu: bypass tiling flag check in virtual display case (v2) (git-fixes).\n- drm/amdgpu: check vm ready by amdgpu_vm-\u003eevicting flag (git-fixes).\n- drm/amdgpu: conduct a proper cleanup of PDB bo (git-fixes).\n- drm/amdgpu/cs: make commands with 0 chunks illegal behaviour (git-fixes).\n- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).\n- drm/amdgpu/display: add support for multiple backlights (git-fixes).\n- drm/amdgpu: do not do resets on APUs which do not support it (git-fixes).\n- drm/amdgpu: do not enable asic reset for raven2 (git-fixes).\n- drm/amdgpu: do not set s3 and s0ix at the same time (git-fixes).\n- drm/amdgpu: do not use BACO for reset in S3 (git-fixes).\n- drm/amdgpu: do not use passthrough mode in Xen dom0 (git-fixes).\n- drm/amdgpu: Drop inline from amdgpu_ras_eeprom_max_record_count (git-fixes).\n- drm/amdgpu: Enable gfxoff quirk on MacBook Pro (git-fixes).\n- drm/amdgpu: Ensure HDA function is suspended before ASIC reset (git-fixes).\n- drm/amdgpu: explicitly check for s0ix when evicting resources (git-fixes).\n- drm/amdgpu: fix amdgpu_ras_block_late_init error handler (bsc#1190497)\n- drm/amdgpu: fix logic inversion in check (git-fixes).\n- drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() (git-fixes).\n- drm/amdgpu: Fix recursive locking warning (git-fixes).\n- drm/amdgpu: fix suspend/resume hang regression (git-fixes).\n- drm/amdgpu/sdma: Fix incorrect calculations of the wptr of the doorbells (git-fixes).\n- drm/amdgpu: skipping SDMA hw_init and hw_fini for S0ix (git-fixes).\n- drm/amdgpu/smu10: fix SoC/fclk units in auto mode (git-fixes).\n- drm/amdgpu: suppress the warning about enum value \u0027AMD_IP_BLOCK_TYPE_NUM\u0027 (git-fixes).\n- drm/amdgpu/ucode: Remove firmware load type check in amdgpu_ucode_free_bo (git-fixes).\n- drm/amdgpu: unify BO evicting method in amdgpu_ttm (git-fixes).\n- drm/amdgpu: update VCN codec support for Yellow Carp (git-fixes).\n- drm/amdgpu/vcn: Fix the register setting for vcn1 (git-fixes).\n- drm/amdgpu/vcn: improve vcn dpg stop procedure (git-fixes).\n- drm/amdgpu: vi: disable ASPM on Intel Alder Lake based systems (bsc#1190786)\n- drm/amdkfd: add pinned BOs to kfd_bo_list (git-fixes).\n- drm/amdkfd: Check for potential null return of kmalloc_array() (git-fixes).\n- drm/amdkfd: Create file descriptor after client is added to smi_clients list (git-fixes).\n- drm/amdkfd: Do not take process mutex for svm ioctls (git-fixes).\n- drm/amdkfd: Fix GWS queue count (bsc#1190786)\n- drm/amdkfd: Fix Incorrect VMIDs passed to HWS (git-fixes).\n- drm/amdkfd: make CRAT table missing message informational only (git-fixes).\n- drm/amdkfd: remove unused function (git-fixes).\n- drm/amdkfd: Separate pinned BOs destruction from general routine (bsc#1195287).\n- drm/amdkfd: Use mmget_not_zero in MMU notifier (git-fixes).\n- drm/amd/pm: correct the MGpuFanBoost support for Beige Goby (git-fixes).\n- drm/amd/pm: correct the sequence of sending gpu reset msg (git-fixes).\n- drm/amd/pm: correct UMD pstate clocks for Dimgrey Cavefish and Beige Goby (git-fixes).\n- drm/amd/pm: enable pm sysfs write for one VF mode (git-fixes).\n- drm/amd/pm: fix hwmon node of power1_label create issue (git-fixes).\n- drm/amd/pm: Fix missing thermal throttler status (git-fixes).\n- drm/amd/pm: fix some OEM SKU specific stability issues (git-fixes).\n- drm/amd/pm: return -ENOTSUPP if there is no get_dpm_ultimate_freq function (git-fixes).\n- drm/amd/pm: update smartshift powerboost calc for smu12 (git-fixes).\n- drm/amd/pm: update smartshift powerboost calc for smu13 (git-fixes).\n- drm/amd/pm: use bitmap_{from,to}_arr32 where appropriate (git-fixes).\n- drm/ast: Create threshold values for AST2600 (bsc#1190786)\n- drm/atomic: Do not pollute crtc_state-\u003emode_blob with error pointers (git-fixes).\n- drm/atomic: Force bridge self-refresh-exit on CRTC switch (git-fixes).\n- drm: avoid circular locks in drm_mode_getconnector (git-fixes).\n- drm/blend: fix typo in the comment (git-fixes).\n- drm/bridge: Add missing pm_runtime_disable() in __dw_mipi_dsi_probe (git-fixes).\n- drm/bridge: Add missing pm_runtime_put_sync (git-fixes).\n- drm/bridge: adv7511: clean up CEC adapter when probe fails (git-fixes).\n- drm: bridge: adv7511: Fix ADV7535 HPD enablement (git-fixes).\n- drm/bridge: analogix_dp: Grab runtime PM reference for DP-AUX (git-fixes).\n- drm/bridge: analogix_dp: Support PSR-exit to disable transition (git-fixes).\n- drm/bridge: anx7625: Fix overflow issue on reading EDID (git-fixes).\n- drm/bridge: cdns-dsi: Make sure to to create proper aliases for dt (git-fixes).\n- drm/bridge: dw-hdmi: use safe format when first in bridge chain (git-fixes).\n- drm/bridge: Fix error handling in analogix_dp_probe (git-fixes).\n- drm/bridge: Fix free wrong object in sii8620_init_rcp_input_dev (git-fixes).\n- drm: bridge: fix unmet dependency on DRM_KMS_HELPER for DRM_PANEL_BRIDGE (git-fixes).\n- drm: bridge: icn6211: Fix HFP_HSW_HBP_HI and HFP_MIN handling (bsc#1190786)\n- drm: bridge: icn6211: Fix register layout (git-fixes).\n- drm: bridge: it66121: Fix the register page length (git-fixes).\n- drm/bridge: nwl-dsi: Fix PM disable depth imbalance in nwl_dsi_probe (git-fixes).\n- drm/bridge: sn65dsi83: Fix an error handling path in (bsc#1190786)\n- drm/bridge: ti-sn65dsi83: Handle dsi_lanes == 0 as invalid (git-fixes).\n- drm/bridge: ti-sn65dsi86: Properly undo autosuspend (git-fixes).\n- drm/cma-helper: Set VM_DONTEXPAND for mmap (git-fixes).\n- drm/connector: Fix typo in output format (bsc#1190786)\n- drm/doc: overview before functions for drm_writeback.c (git-fixes).\n- drm/dp: Fix OOB read when handling Post Cursor2 register (bsc#1190786)\n- drm/edid: Always set RGB444 (git-fixes).\n- drm/edid: check basic audio support on CEA extension block (git-fixes).\n- drm/edid: Do not clear formats if using deep color (git-fixes).\n- drm/edid: fix CEA extension byte #3 parsing (bsc#1190786)\n- drm/edid: fix invalid EDID extension block filtering (git-fixes).\n- drm/etnaviv: check for reaped mapping in etnaviv_iommu_unmap_gem (git-fixes).\n- drm/fb-helper: Mark screen buffers in system memory with FBINFO_VIRTFB (git-fixes).\n- drm/fourcc: fix integer type usage in uapi header (git-fixes).\n- drm/i915/adlp: Fix TypeC PHY-ready status readout (git-fixes).\n- drm/i915: Allow !join_mbus cases for adlp+ dbuf configuration (bsc#1193640).\n- drm/i915: Check EDID for HDR static metadata when choosing blc (bsc#1190497)\n- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).\n- drm/i915/dg2: Print PHY name properly on calibration error (git-fixes).\n- drm/i915: Disable DRRS on IVB/HSW port != A (git-fixes).\n- drm/i915/display: Fix HPD short pulse handling for eDP (git-fixes).\n- drm/i915/display: Move DRRS code its own file (git-fixes).\n- drm/i915/display/psr: Unset enable_psr2_sel_fetch if other checks in intel_psr2_config_valid() fails (git-fixes).\n- drm/i915/display: split out dpt out of intel_display.c (git-fixes).\n- drm/i915/dmc: Add MMIO range restrictions (git-fixes).\n- drm/i915/dsi: fix VBT send packet port selection for ICL+ (git-fixes).\n- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).\n- drm/i915: Fix CFI violation with show_dynamic_id() (git-fixes).\n- drm/i915: Fix dbuf slice config lookup (git-fixes bsc#1193640).\n- drm/i915: Fix mbus join config lookup (git-fixes bsc#1193640).\n- drm/i915: Fix PSF GV point mask when SAGV is not possible (git-fixes).\n- drm/i915: Fix race in __i915_vma_remove_closed (bsc#1190497)\n- drm/i915: Fix SEL_FETCH_PLANE_*(PIPE_B+) register addresses (bsc#1190497)\n- drm/i915: Fix -Wstringop-overflow warning in call to intel_read_wm_latency() (git-fixes).\n- drm/i915/gem: add missing boundary check in vm_access (git-fixes).\n- drm/i915/gem: add missing else (git-fixes).\n- drm/i915/guc/slpc: Correct the param count for unset param (git-fixes).\n- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).\n- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).\n- drm/i915: Implement w/a 22010492432 for adl-s (git-fixes).\n- drm/i915: Keep gem ctx-\u003evm alive until the final put (bsc#1190497)\n- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).\n- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).\n- drm/i915: Populate pipe dbuf slices more accurately during readout (bsc#1193640).\n- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).\n- drm/i915: s/JSP2/ICP2/ PCH (git-fixes).\n- drm/i915: Treat SAGV block time 0 as SAGV disabled (git-fixes).\n- drm/i915/ttm: ensure we unmap when purging (git-fixes).\n- drm/i915/ttm: tweak priority hint selection (git-fixes).\n- drm/i915: Widen the QGV point mask (git-fixes).\n- drm/i915: Workaround broken BIOS DBUF configuration on TGL/RKL (bsc#1193640).\n- drm/imx: dw_hdmi-imx: Fix bailout in error cases of probe (git-fixes).\n- drm: imx: fix compiler warning with gcc-12 (git-fixes).\n- drm/imx: Fix memory leak in imx_pd_connector_get_modes (git-fixes).\n- drm/imx: imx-ldb: Check for null pointer after calling kmemdup (git-fixes).\n- drm/imx: parallel-display: Remove bus flags check in imx_pd_bridge_atomic_check() (git-fixes).\n- drm/kmb: Fix for build errors with Warray-bounds (git-fixes).\n- drm/komeda: Fix an undefined behavior bug in komeda_plane_add() (git-fixes).\n- drm/komeda: return early if drm_universal_plane_init() fails (git-fixes).\n- drm: mali-dp: potential dereference of null pointer (git-fixes).\n- drm/mediatek: Add vblank register/unregister callback functions (bsc#1190768)\n- drm/mediatek: dpi: Use mt8183 output formats for mt8192 (git-fixes).\n- drm/mediatek: Fix mtk_cec_mask() (git-fixes).\n- drm/mediatek: mtk_dsi: Reset the dsi0 hardware (git-fixes).\n- drm/meson: Fix error handling when afbcd.ops-\u003einit fails (git-fixes).\n- drm/meson: Make use of the helper function devm_platform_ioremap_resourcexxx() (git-fixes).\n- drm/meson: osd_afbcd: Add an exit callback to struct meson_afbcd_ops (git-fixes).\n- drm/meson: split out encoder from meson_dw_hdmi (git-fixes).\n- drm/msm/a6xx: Fix missing ARRAY_SIZE() check (git-fixes).\n- drm/msm/a6xx: Fix refcount leak in a6xx_gpu_init (git-fixes).\n- drm/msm: add missing include to msm_drv.c (git-fixes).\n- drm/msm: Add missing put_task_struct() in debugfs path (git-fixes).\n- drm/msm/disp: check the return value of kzalloc() (git-fixes).\n- drm/msm/disp/dpu1: set mdp clk to the maximum frequency in opp table (bsc#1190768)\n- drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume (git-fixes).\n- drm/msm/dp: add fail safe mode outside of event_mutex context (git-fixes).\n- drm/msm/dp: always add fail-safe mode into connector mode list (git-fixes).\n- drm/msm/dp: Always clear mask bits to disable interrupts at dp_ctrl_reset_irq_ctrl() (git-fixes).\n- drm/msm/dp: check core_initialized before disable interrupts at dp_display_unbind() (git-fixes).\n- drm/msm/dp: do not initialize phy until plugin interrupt received (bsc#1190497)\n- drm/msm/dp: do not stop transmitting phy test pattern during DP phy compliance test (git-fixes).\n- drm/msm/dp: dp_link_parse_sink_count() return immediately if aux read failed (git-fixes).\n- drm/msm/dp: fix error check return value of irq_of_parse_and_map() (git-fixes).\n- drm/msm/dp: fix event thread stuck in wait_event after kthread_stop() (git-fixes).\n- drm/msm/dp: force link training for display resolution change (git-fixes).\n- drm/msm/dp: Modify prototype of encoder based API (git-fixes).\n- drm/msm/dp: populate connector of struct dp_panel (git-fixes).\n- drm/msm/dp: remove fail safe mode related code (git-fixes).\n- drm/msm/dp: reset DP controller before transmit phy test pattern (git-fixes).\n- drm/msm/dp: stop event kernel thread when DP unbind (bsc#1190768)\n- drm/msm/dp: stop link training after link training 2 failed (git-fixes).\n- drm/msm/dp: tear down main link at unplug handle immediately (bsc#1190768)\n- drm/msm/dpu: add DSPP blocks teardown (git-fixes).\n- drm/msm/dpu: adjust display_v_end for eDP and DP (git-fixes).\n- drm/msm/dpu: fix dp audio condition (git-fixes).\n- drm/msm/dpu: fix error check return value of irq_of_parse_and_map() (bsc#1190768)\n- drm/msm/dpu: handle pm_runtime_get_sync() errors in bind path (git-fixes).\n- drm/msm/dsi: fix address for second DSI PHY on SDM660 (git-fixes).\n- drm/msm/dsi: fix error checks and return values for DSI xmit functions (git-fixes).\n- drm/msm/dsi: Remove spurious IRQF_ONESHOT flag (git-fixes).\n- drm/msm/dsi: Use connector directly in msm_dsi_manager_connector_init() (git-fixes).\n- drm/msm/dsi: Use \u0027ref\u0027 fw clock instead of global name for VCO parent (git-fixes).\n- drm/msm: Fix double pm_runtime_disable() call (git-fixes).\n- drm: msm: fix error check return value of irq_of_parse_and_map() (git-fixes).\n- drm: msm: fix possible memory leak in mdp5_crtc_cursor_set() (git-fixes).\n- drm/msm: Fix range size vs end confusion (git-fixes).\n- drm/msm/hdmi: check return value after calling platform_get_resource_byname() (git-fixes).\n- drm/msm/hdmi: fix error check return value of irq_of_parse_and_map() (git-fixes).\n- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).\n- drm/msm/mdp5: check the return of kzalloc() (git-fixes).\n- drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected (git-fixes).\n- drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected (git-fixes).\n- drm/msm: properly add and remove internal bridges (bsc#1190768)\n- drm/msm: remove unused plane_property field from msm_drm_private (bsc#1190768)\n- drm/msm: return an error pointer in msm_gem_prime_get_sg_table() (git-fixes).\n- drm/msm: Switch ordering of runpm put vs devfreq_idle (git-fixes).\n- drm/msm: use for_each_sgtable_sg to iterate over scatterlist (git-fixes).\n- drm/nouveau/acr: Fix undefined behavior in nvkm_acr_hsfw_load_bl() (git-fixes).\n- drm/nouveau/backlight: Just set all backlight types as RAW (git-fixes).\n- drm/nouveau/clk: Fix an incorrect NULL check on list iterator (git-fixes).\n- drm/nouveau: Fix a potential theorical leak in nouveau_get_backlight_name() (git-fixes).\n- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).\n- drm/nouveau/kms/nv50-: atom: fix an incorrect NULL check on list iterator (git-fixes).\n- drm/nouveau/pmu: Add missing callbacks for Tegra devices (git-fixes).\n- drm/nouveau/pmu/gm200-: use alternate falcon reset sequence (git-fixes).\n- drm/nouveau/subdev/bus: Ratelimit logging for fault errors (git-fixes).\n- drm/nouveau/tegra: Stop using iommu_present() (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).\n- drm/panel: panel-simple: Fix proper bpc for AM-1280800N3TZQW-T00H (git-fixes).\n- drm/panel/raspberrypi-touchscreen: Avoid NULL deref if not initialised (git-fixes).\n- drm/panel/raspberrypi-touchscreen: Initialise the bridge in prepare (git-fixes).\n- drm/panel: simple: Add missing bus flags for Innolux G070Y2-L01 (git-fixes).\n- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).\n- drm/panel: simple: Fix Innolux G070Y2-L01 BPP settings (git-fixes).\n- drm/panfrost: Check for error num after setting mask (git-fixes).\n- drm/plane: Move range check for format_count earlier (git-fixes).\n- drm/radeon: fix a possible null pointer dereference (git-fixes).\n- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).\n- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).\n- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).\n- drm/rockchip: vop: fix possible null-ptr-deref in vop_bind() (git-fixes).\n- drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode (git-fixes).\n- drm/simpledrm: Add \u0027panel orientation\u0027 property on non-upright mounted LCD panels (git-fixes).\n- drm: sti: do not use kernel-doc markers (git-fixes).\n- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).\n- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).\n- drm/sun4i: Remove obsolete references to PHYS_OFFSET (bsc#1190786)\n- drm/syncobj: flatten dma_fence_chains on transfer (git-fixes).\n- drm/tegra: Add back arm_iommu_detach_device() (git-fixes).\n- drm/tegra: Fix reference leak in tegra_dsi_ganged_probe (git-fixes).\n- drm: use the lookup lock in drm_is_current_master (git-fixes).\n- drm/v3d/v3d_drv: Check for error num after setting mask (git-fixes).\n- drm/vc4: crtc: Fix runtime_pm reference counting (git-fixes).\n- drm/vc4: Fix deadlock on DSI device attach error (git-fixes).\n- drm/vc4: hdmi: Add debugfs prefix (bsc#1199163).\n- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).\n- drm/vc4: hdmi: Fix build error for implicit function declaration (git-fixes).\n- drm/vc4: hdmi: Fix HPD GPIO detection (git-fixes).\n- drm/vc4: hdmi: Make sure the device is powered with CEC (git-fixes).\n- drm/vc4: hdmi: Split the CEC disable / enable functions in two (git-fixes).\n- drm/vc4: hvs: Fix frame count register readout (git-fixes).\n- drm/vc4: hvs: Reset muxes at probe time (git-fixes).\n- drm/vc4: txp: Do not set TXP_VSTART_AT_EOF (git-fixes).\n- drm/vc4: txp: Force alpha to be 0xff if it\u0027s disabled (git-fixes).\n- drm/vc4: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes).\n- drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() (git-fixes).\n- drm/virtio: fix NULL pointer dereference in virtio_gpu_conn_get_modes (git-fixes).\n- drm/vmwgfx: Disable command buffers on svga3 without gbobjects (git-fixes).\n- drm/vmwgfx: Fix fencing on SVGAv3 (git-fixes).\n- drm/vmwgfx: Initialize drm_mode_fb_cmd2 (git-fixes).\n- drm/vmwgfx: Remove unused compile options (bsc#1190786)\n- drm/vmwgfx: validate the screen formats (git-fixes).\n- drm/vrr: Set VRR capable prop only if it is attached to connector (git-fixes).\n- dt-bindings: arm: bcm: fix BCM53012 and BCM53016 SoC strings (git-fixes).\n- dt-bindings: can: tcan4x5x: fix mram-cfg RX FIFO config (git-fixes).\n- dt-bindings: display: sitronix, st7735r: Fix backlight in example (git-fixes).\n- dt-bindings: gpio: altera: correct interrupt-cells (git-fixes).\n- dt-bindings: memory: mtk-smi: No need mediatek,larb-id for mt8167 (git-fixes).\n- dt-bindings: mtd: nand-controller: Fix a comment in the examples (git-fixes).\n- dt-bindings: mtd: nand-controller: Fix the reg property description (git-fixes).\n- dt-bindings: net: xgmac_mdio: Remove unsupported \u0027bus-frequency\u0027 (git-fixes).\n- dt-bindings: PCI: xilinx-cpm: Fix reg property order (git-fixes).\n- dt-bindings: phy: uniphier-usb3hs: Fix incorrect clock-names and reset-names (git-fixes).\n- dt-bindings: pinctrl: aspeed-g6: remove FWQSPID group (git-fixes).\n- dt-bindings: pinctrl: pinctrl-microchip-sgpio: Fix example (git-fixes).\n- dt-bindings: spi: mxic: The interrupt property is not mandatory (git-fixes).\n- dt-bindings: usb: ehci: Increase the number of PHYs (git-fixes).\n- dt-bindings: usb: hcd: correct usb-device path (git-fixes).\n- dt-bindings: usb: ohci: Increase the number of PHYs (git-fixes).\n- dt-bindings: watchdog: Require samsung,syscon-phandle for Exynos7 (git-fixes).\n- e1000e: Correct NVM checksum verification flow (bsc#1191663).\n- e1000e: Fix possible HW unit hang after an s0ix exit (jsc#SLE-18382).\n- e1000e: Fix possible overflow in LTR decoding (git-fixes).\n- e1000e: Handshake with CSME starts from ADL platforms (git-fixes).\n- e1000e: Separate ADP board type from TGP (git-fixes).\n- EDAC/altera: Fix deferred probing (bsc#1190497).\n- EDAC/amd64: Add new register offset support and related changes (jsc#SLE-19026).\n- EDAC/amd64: Set memory type per DIMM (jsc#SLE-19026).\n- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1190497).\n- EDAC/synopsys: Read the error count from the correct register (bsc#1190497).\n- EDAC/xgene: Fix deferred probing (bsc#1190497).\n- eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX (git-fixes).\n- efi: Add missing prototype for efi_capsule_setup_info (git-fixes).\n- efi: Do not import certificates from UEFI Secure Boot for T2 Macs (git-fixes).\n- efi: fix return value of __setup handlers (git-fixes).\n- efivars: Respect \u0027block\u0027 flag in efivar_entry_set_safe() (git-fixes).\n- enable DRM_BOCHS as module (bsc#1200572)\n- epic100: fix use after free on rmmod (git-fixes).\n- ethernet/sfc: remove redundant rc variable (bsc#1196306).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext2: correct max file size computing (bsc#1197820).\n- ext4: avoid trim error on fs with small groups (bsc#1191271).\n- ext4: destroy ext4_fc_dentry_cachep kmemcache on module removal (bsc#1197917).\n- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix ext4_fc_stats trace point (git-fixes).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- ext4: reject the \u0027commit\u0027 option on ext2 filesystems (bsc#1200808).\n- extcon: Modify extcon device to be created after driver data is set (git-fixes).\n- extcon: ptn5150: Add queue work sync before driver release (git-fixes).\n- faddr2line: Fix overlapping text section failures, the sequel (git-fixes).\n- fbcon: Avoid \u0027cap\u0027 set but not used warning (bsc#1190786)\n- fbcon: Consistently protect deferred_takeover with console_lock() (git-fixes).\n- firewire: core: extend card-\u003elock in fw_core_handle_bus_reset (git-fixes).\n- firewire: fix potential uaf in outbound_phy_packet_callback() (git-fixes).\n- firewire: remove check of list iterator against head past the loop body (git-fixes).\n- firmware: arm_ffa: Fix uuid parameter to ffa_partition_probe (git-fixes).\n- firmware: arm_ffa: Remove incorrect assignment of driver_data (git-fixes).\n- firmware: arm_scmi: Fix list protocols enumeration in the base protocol (git-fixes).\n- firmware: arm_scmi: Fix sorting of retrieved clock rates (git-fixes).\n- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).\n- firmware: arm_scmi: Validate BASE_DISCOVER_LIST_PROTOCOLS response (git-fixes).\n- firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle (git-fixes).\n- firmware: google: Properly state IOMEM dependency (git-fixes).\n- firmware: qcom: scm: Remove reassignment to desc following initializer (git-fixes).\n- firmware: stratix10-svc: add missing callback parameter on RSU (git-fixes).\n- firmware: stratix10-svc: fix a missing check on list iterator (git-fixes).\n- firmware: sysfb: fix platform-device leak in error path (git-fixes).\n- firmware: ti_sci: Fix compilation failure when CONFIG_TI_SCI_PROTOCOL is not defined (git-fixes).\n- firmware: use kernel credentials when reading firmware (git-fixes).\n- Fix a warning about a malformed kernel doc comment in cifs (bsc#1193629).\n- fs: fd tables have to be multiples of BITS_PER_LONG (bsc#1200827).\n- fs: fix fd table size alignment properly (bsc#1200882).\n- fs: handle circular mappings correctly (bsc#1197918).\n- fsl_lpuart: Do not enable interrupts too early (git-fixes).\n- fsnotify: Do not insert unmergeable events in hashtable (bsc#1197922).\n- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195944 bsc#1195478).\n- fsnotify: fix wrong lockdep annotations (bsc#1200815).\n- ftrace: Clean up hash direct_functions on register failures (git-fixes).\n- fuse: fix fileattr op failure (bsc#1197292).\n- gen_init_cpio: fix short read file handling (bsc#1193289).\n- genirq/affinity: Consider that CPUs on nodes can be (git-fixes)\n- genirq: Synchronize interrupt thread startup (git-fixes)\n- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).\n- gma500: fix an incorrect NULL check on list iterator (git-fixes).\n- gpio: adp5588: Remove support for platform setup and teardown callbacks (git-fixes).\n- gpio: aggregator: Fix calling into sleeping GPIO controllers (git-fixes).\n- gpio: dwapb: Do not print error on -EPROBE_DEFER (git-fixes).\n- gpio: gpio-vf610: do not touch other bits when set the target bit (git-fixes).\n- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).\n- gpiolib: acpi: use correct format characters (git-fixes).\n- gpiolib: Never return internal error codes to user space (git-fixes).\n- gpiolib: of: fix bounds check for \u0027gpio-reserved-ranges\u0027 (git-fixes).\n- gpio: mvebu: drop pwm base assignment (git-fixes).\n- gpio: mvebu/pwm: Refuse requests with inverted polarity (git-fixes).\n- gpio: pca953x: fix irq_stat not updated when irq is disabled (irq_mask not set) (git-fixes).\n- gpio: pca953x: use the correct register address to do regcache sync (git-fixes).\n- gpio: Return EPROBE_DEFER if gc-\u003eto_irq is NULL (git-fixes).\n- gpio: Revert regression in sysfs-gpio (gpiolib.c) (git-fixes).\n- gpio: sifive: use the correct register to read output values (git-fixes).\n- gpio: tegra186: Fix chip_data type confusion (git-fixes).\n- gpio: ts4900: Do not set DAT and OE together (git-fixes).\n- gpio: visconti: Fix fwnode of GPIO IRQ (git-fixes).\n- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).\n- gpu: host1x: Fix a memory leak in \u0027host1x_remove()\u0027 (git-fixes).\n- gpu: ipu-v3: Fix dev_dbg frequency output (git-fixes).\n- gup: Turn fault_in_pages_{readable,writeable} into fault_in_{readable,writeable} (git-fixes).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- gve: fix the wrong AdminQ buffer queue index check (git-fixes).\n- habanalabs: Add check for pci_enable_device (git-fixes).\n- habanalabs: fix possible memory leak in MMU DR fini (git-fixes).\n- hamradio: fix macro redefine warning (git-fixes).\n- hex2bin: fix access beyond string end (git-fixes).\n- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).\n- HID: add mapping for KEY_DICTATE (git-fixes).\n- HID: Add support for open wheel and no attachment to T300 (git-fixes).\n- HID:Add support for UGTABLET WP5540 (git-fixes).\n- HID: amd_sfh: Add illuminance mask to limit ALS max value (git-fixes).\n- HID: amd_sfh: Correct the structure field name (git-fixes).\n- HID: amd_sfh: Modify the bus name (git-fixes).\n- HID: amd_sfh: Modify the hid name (git-fixes).\n- HID: bigben: fix slab-out-of-bounds Write in bigben_probe (git-fixes).\n- hide appended member supports_dynamic_smps_6ghz (git-fixes).\n- HID: elan: Fix potential double free in elan_input_configured (git-fixes).\n- HID: hid-led: fix maximum brightness for Dream Cheeky (git-fixes).\n- HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts (git-fixes).\n- HID: i2c-hid: fix GET/SET_REPORT for unnumbered reports (git-fixes).\n- HID: intel-ish-hid: Use dma_alloc_coherent for firmware update (git-fixes).\n- HID: logitech-dj: add new lightspeed receiver id (git-fixes).\n- HID: multitouch: add quirks to enable Lenovo X12 trackpoint (git-fixes).\n- HID: multitouch: Add support for Google Whiskers Touchpad (git-fixes).\n- HID: multitouch: fix Dell Precision 7550 and 7750 button type (bsc#1197243).\n- HID: vivaldi: fix sysfs attributes leak (git-fixes).\n- hinic: fix bug of wq out of bound access (git-fixes).\n- hv_balloon: rate-limit \u0027Unhandled message\u0027 warning (git-fixes).\n- hv_netvsc: Add check for kvmalloc_array (git-fixes).\n- hv_utils: Add comment about max VMbus packet size in VSS driver (git-fixes).\n- hwmon: (dell-smm) Speed up setting of fan speed (git-fixes).\n- hwmon: (f71882fg) Fix negative temperature (git-fixes).\n- hwmon: Handle failure to register sensor with thermal zone correctly (git-fixes).\n- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).\n- hwmon: (ltq-cputemp) restrict it to SOC_XWAY (git-fixes).\n- hwmon: (pmbus) Add mutex to regulator ops (git-fixes).\n- hwmon: (pmbus) Add Vin unit off handling (git-fixes).\n- hwmon: (pmbus) Check PEC support before reading other registers (git-fixes).\n- hwmon: (pmbus) Clear pmbus fault/warning bits after read (git-fixes).\n- hwmon: (pmbus) disable PEC if not enabled (git-fixes).\n- hwmon: (sch56xx-common) Replace WDOG_ACTIVE with WDOG_HW_RUNNING (git-fixes).\n- hwmon: (tmp401) Add OF device ID table (git-fixes).\n- hwrng: atmel - disable trng on failure path (git-fixes).\n- hwrng: cavium - Check health status while reading random data (git-fixes).\n- hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes).\n- hwrng: nomadik - Change clk_disable to clk_disable_unprepare (git-fixes).\n- hwrng: omap3-rom - fix using wrong clk_disable() in omap_rom_rng_runtime_resume() (git-fixes).\n- i2c: at91: Initialize dma_buf in at91_twi_xfer() (git-fixes).\n- i2c: at91: use dma safe buffers (git-fixes).\n- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).\n- i2c: bcm2835: Fix the error handling in \u0027bcm2835_i2c_probe()\u0027 (git-fixes).\n- i2c: bcm2835: Use platform_get_irq() to get the interrupt (git-fixes).\n- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).\n- i2c: cadence: Increase timeout per message if necessary (git-fixes).\n- i2c: designware: Use standard optional ref clock implementation (git-fixes).\n- i2c: dev: Force case user pointers in compat_i2cdev_ioctl() (git-fixes).\n- i2c: ismt: prevent memory corruption in ismt_access() (git-fixes).\n- i2c: ismt: Provide a DMA buffer for Interrupt Cause Logging (git-fixes).\n- i2c: meson: Fix wrong speed use from probe (git-fixes).\n- i2c: mt7621: fix missing clk_disable_unprepare() on error in mtk_i2c_probe() (git-fixes).\n- i2c: mux: demux-pinctrl: do not deactivate a master that is not active (git-fixes).\n- i2c: npcm7xx: Add check for platform_driver_register (git-fixes).\n- i2c: npcm: Correct register access width (git-fixes).\n- i2c: npcm: Fix timeout calculation (git-fixes).\n- i2c: npcm: Handle spurious interrupts (git-fixes).\n- i2c: piix4: Add EFCH MMIO support for SMBus port select (git-fixes).\n- i2c: piix4: Add EFCH MMIO support to region request and release (git-fixes).\n- i2c: piix4: Add EFCH MMIO support to SMBus base address detect (git-fixes).\n- i2c: piix4: Enable EFCH MMIO for Family 17h+ (git-fixes).\n- i2c: piix4: Move port I/O region request/release code into functions (git-fixes).\n- i2c: piix4: Move SMBus controller base address detect into function (git-fixes).\n- i2c: piix4: Move SMBus port selection into function (git-fixes).\n- i2c: piix4: Replace hardcoded memory map size with a #define (git-fixes).\n- i2c: qcom-cci: do not delete an unregistered adapter (git-fixes).\n- i2c: qcom-cci: do not put a device tree node before i2c_add_adapter() (git-fixes).\n- i2c: rcar: fix PM ref counts in probe error paths (git-fixes).\n- i2c: xiic: Make bus names unique (git-fixes).\n- i40e: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- i40e: Fix for failed to init adminq while VF reset (git-fixes).\n- i40e: Fix issue when maximum queues is exceeded (git-fixes).\n- i40e: Fix queues reservation for XDP (git-fixes).\n- i40e: Fix reset bw limit when DCB enabled with 1 TC (git-fixes).\n- i40e: Fix reset path while removing the driver (git-fixes).\n- i40e: fix unsigned stat widths (git-fixes).\n- i40e: i40e_main: fix a missing check on list iterator (git-fixes).\n- i40e: Increase delay to 1 s after global EMP reset (git-fixes).\n- i40e: remove dead stores on XSK hotpath (jsc#SLE-18378).\n- i40e: respect metadata on XSK Rx to skb (git-fixes).\n- i40e: stop disabling VFs due to PF error responses (jsc#SLE-18378).\n- iavf: Add waiting so the port is initialized in remove (jsc#SLE-18385).\n- iavf: Fix deadlock in iavf_reset_task (jsc#SLE-18385).\n- iavf: Fix double free in iavf_reset_task (jsc#SLE-18385).\n- iavf: Fix handling of vlan strip virtual channel messages (jsc#SLE-18385).\n- iavf: Fix hang during reboot/shutdown (jsc#SLE-18385).\n- iavf: Fix __IAVF_RESETTING state usage (jsc#SLE-18385).\n- iavf: Fix init state closure on remove (jsc#SLE-18385).\n- iavf: Fix locking for VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS (jsc#SLE-18385).\n- iavf: Fix missing check for running netdev (git-fixes).\n- iavf: Fix race in init state (jsc#SLE-18385).\n- iavf: Rework mutexes for better synchronisation (jsc#SLE-18385 stable-5.14.6).\n- IB/cma: Allow XRC INI QPs to set their local ACK timeout (git-fixes).\n- IB/cm: Cancel mad on the DREQ event when the state is MRA_REP_RCVD (git-fixes).\n- IB/cm: Release previously acquired reference counter in the cm_id_priv (git-fixes).\n- IB/hfi1: Allow larger MTU without AIP (git-fixes).\n- IB/hfi1: Fix AIP early init panic (git-fixes).\n- IB/hfi1: Fix alloc failure with larger txqueuelen (git-fixes).\n- IB/hfi1: Fix panic with larger ipoib send_queue_size (jsc#SLE-19242).\n- IB/hfi1: Fix tstats alloc and dealloc (git-fixes).\n- IB/mlx5: Expose NDR speed through MAD (bsc#1196930).\n- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).\n- ibmvnic: fix race between xmit and reset (bsc#1197302 ltc#197259).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).\n- IB/qib: Fix duplicate sysfs directory name (git-fixes).\n- IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition (git-fixes).\n- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).\n- ice: allow creating VFs for !CONFIG_NET_SWITCHDEV (jsc#SLE-18375).\n- ice: check the return of ice_ptp_gettimex64 (git-fixes).\n- ice: clear cmd_type_offset_bsz for TX rings (jsc#SLE-18375).\n- ice: Clear default forwarding VSI during VSI release (git-fixes).\n- ice: clear stale Tx queue settings before configuring (git-fixes).\n- ice: do not allow to run ice_send_event_to_aux() in atomic ctx (git-fixes).\n- ice: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- ice: Do not use GFP_KERNEL in atomic context (git-fixes).\n- ice: enable parsing IPSEC SPI headers for RSS (git-fixes).\n- ice: fix an error code in ice_cfg_phy_fec() (git-fixes).\n- ice: fix concurrent reset and removal of VFs (git-fixes).\n- ice: fix crash in switchdev mode (jsc#SLE-18375).\n- ice: Fix curr_link_speed advertised speed (git-fixes).\n- ice: Fix incorrect locking in ice_vc_process_vf_msg() (jsc#SLE-18375).\n- ice: fix IPIP and SIT TSO offload (git-fixes).\n- ice: fix NULL pointer dereference in ice_update_vsi_tx_ring_stats() (jsc#SLE-18375).\n- ice: fix PTP stale Tx timestamps cleanup (git-fixes).\n- ice: fix setting l4 port flag when adding filter (jsc#SLE-18375).\n- ice: fix use-after-free when deinitializing mailbox snapshot (git-fixes).\n- ice: initialize local variable \u0027tlv\u0027 (git-fixes).\n- ice: kabi protect ice_pf (bsc#1200502).\n- ice: Protect vf_state check by cfg_lock in ice_vc_process_vf_msg() (jsc#SLE-18375).\n- ice: respect metadata on XSK Rx to skb (git-fixes).\n- ice: synchronize_rcu() when terminating rings (git-fixes).\n- ice: xsk: Fix indexing in ice_tx_xsk_pool() (jsc#SLE-18375).\n- ice: xsk: fix VSI state check in ice_xsk_wakeup() (git-fixes).\n- igb: refactor XDP registration (git-fixes).\n- igc: avoid kernel warning when changing RX ring parameters (git-fixes).\n- igc: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- igc: Fix BUG: scheduling while atomic (git-fixes).\n- igc: Fix infinite loop in release_swfw_sync (git-fixes).\n- igc: Fix suspending when PTM is active (jsc#SLE-18377).\n- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).\n- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).\n- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).\n- iio: accel: fxls8962af: add padding to regmap for SPI (git-fixes).\n- iio:accel:kxcjk-1013: rearrange iio trigger get and register (git-fixes).\n- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).\n- iio: accel: mma8452: use the correct logic to get mma8452_data (git-fixes).\n- iio:accel:mxc4005: rearrange iio trigger get and register (git-fixes).\n- iio: adc: ad7124: fix mask used for setting AIN_BUFP and AIN_BUFM bits (git-fixes).\n- iio: adc: ad7124: Remove shift from scan_type (git-fixes).\n- iio: adc: Add check for devm_request_threaded_irq (git-fixes).\n- iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_client (git-fixes).\n- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).\n- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).\n- iio: adc: sc27xx: Fine tune the scale calibration values (git-fixes).\n- iio: adc: sc27xx: fix read big scale voltage not right (git-fixes).\n- iio: adc: stm32: Fix ADCs iteration in irq handler (git-fixes).\n- iio: adc: stm32: Fix IRQs on STM32F4 by removing custom spurious IRQs message (git-fixes).\n- iio: adc: stm32: fix maximum clock rate for stm32mp15x (git-fixes).\n- iio: adc: stmpe-adc: Fix wait_for_completion_timeout return value check (git-fixes).\n- iio: adc: ti-ads131e08: add missing fwnode_handle_put() in ads131e08_alloc_channels() (git-fixes).\n- iio: adc: tsc2046: fix memory corruption by preventing array overflow (git-fixes).\n- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).\n- iio: afe: rescale: Fix boolean logic bug (git-fixes).\n- iio: afe: rescale: use s64 for temporary scale calculations (git-fixes).\n- iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL (git-fixes).\n- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).\n- iio: dac: ad5446: Fix read_raw not returning set value (git-fixes).\n- iio: dac: ad5592r: Fix the missing return value (git-fixes).\n- iio: dummy: iio_simple_dummy: check the return value of kstrdup() (git-fixes).\n- iio: Fix error handling for PM (git-fixes).\n- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).\n- iio:humidity:hts221: rearrange iio trigger get and register (git-fixes).\n- iio:imu:adis16480: fix buffering for devices with no burst mode (git-fixes).\n- iio:imu:bmi160: disable regulator in error path (git-fixes).\n- iio: imu: inv_icm42600: Fix I2C init possible nack (git-fixes).\n- iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot (git-fixes).\n- iio: inkern: apply consumer scale on IIO_VAL_INT cases (git-fixes).\n- iio: inkern: apply consumer scale when no channel scale is available (git-fixes).\n- iio: inkern: make a best effort on offset calculation (git-fixes).\n- iio: magnetometer: ak8975: Fix the error handling in ak8975_power_on() (git-fixes).\n- iio: magnetometer: yas530: Fix memchr_inv() misuse (git-fixes).\n- iio: mma8452: Fix probe failing when an i2c_device_id is used (git-fixes).\n- iio: mma8452: fix probe fail when device tree compatible is used (git-fixes).\n- iio: proximity: vl53l0x: Fix return value check of wait_for_completion_timeout (git-fixes).\n- iio: st_sensors: Add a local lock for protecting odr (git-fixes).\n- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).\n- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).\n- ima: Do not print policy rule with inactive LSM labels (git-fixes).\n- ima: fix reference leak in asymmetric_verify() (git-fixes).\n- ima: Remove ima_policy file before directory (git-fixes).\n- init: call time_init() before rand_initialize() (git-fixes).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- init/main.c: return 1 from handled __setup() functions (git-fixes).\n- initramfs: Check timestamp to prevent broken cpio archive (bsc#1193289).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- Input: add bounds checking to input_set_capability() (git-fixes).\n- Input: aiptek - properly check endpoint type (git-fixes).\n- Input: bcm5974 - set missing URB_NO_TRANSFER_DMA_MAP urb flag (git-fixes).\n- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).\n- Input: elan_i2c: Add deny list for Lenovo Yoga Slim 7 (bsc#1193064).\n- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).\n- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).\n- Input: gpio-keys - cancel delayed work only in case of GPIO (git-fixes).\n- Input: ili210x - fix reset timing (git-fixes).\n- Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes).\n- Input: samsung-keypad - properly state IOMEM dependency (git-fixes).\n- Input: soc_button_array - also add Lenovo Yoga Tablet2 1051F to dmi_use_low_level_irq (git-fixes).\n- Input: sparcspkr - fix refcount leak in bbc_beep_probe (git-fixes).\n- Input: stmfts - do not leave device disabled in stmfts_input_open (git-fixes).\n- Input: stmfts - fix reference leak in stmfts_input_open (git-fixes).\n- Input: synaptics - enable InterTouch on ThinkPad T14/P14s Gen 1 AMD (git-fixes).\n- Input: synaptics: retry query upon error (bsc#1194086).\n- Input: wm97xx: Simplify resource management (git-fixes).\n- Input: zinitix - do not report shadow fingers (git-fixes).\n- integrity: check the return value of audit_log_start() (git-fixes).\n- iocost: do not reset the inuse weight of under-weighted debtors (git-fixes).\n- iocost: Fix divide-by-zero on donation from low hweight cgroup (bsc#1198014).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).\n- iommu/amd: Increase timeout waiting for GA log enablement (bsc#1199052).\n- iommu/amd: Remove useless irq affinity notifier (git-fixes).\n- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).\n- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).\n- iommu/amd: X2apic mode: re-enable after resume (git-fixes).\n- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).\n- iommu: arm-smmu: disable large page mappings for Nvidia arm-smmu (bsc#1198826).\n- iommu/arm-smmu-qcom: Fix TTBR0 read (git-fixes).\n- iommu: Extend mutex lock scope in iommu_probe_device() (git-fixes).\n- iommu/ioasid: Introduce a helper to check for valid PASIDs (jsc#SLE-24350).\n- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).\n- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).\n- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).\n- iommu/sva: Assign a PASID to mm on PASID allocation and free it on mm exit (jsc#SLE-24350).\n- iommu/sva: Rename CONFIG_IOMMU_SVA_LIB to CONFIG_IOMMU_SVA (jsc#SLE-24350).\n- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).\n- ionic: add FW_STOPPING state (git-fixes).\n- ionic: Allow flexibility for error reporting on dev commands (git-fixes).\n- ionic: better handling of RESET event (git-fixes).\n- ionic: catch transition back to RUNNING with fw_generation 0 (git-fixes).\n- ionic: Cleanups in the Tx hotpath code (git-fixes).\n- ionic: Correctly print AQ errors if completions are not received (git-fixes).\n- ionic: disable napi when ionic_lif_init() fails (git-fixes).\n- ionic: Do not send reset commands if FW isn\u0027t running (git-fixes).\n- ionic: fix missing pci_release_regions() on error in ionic_probe() (git-fixes).\n- ionic: fix type complaint in ionic_dev_cmd_clean() (git-fixes).\n- ionic: fix up printing of timeout error (git-fixes).\n- ionic: Prevent filter add/del err msgs when the device is not available (git-fixes).\n- ionic: Query FW when getting VF info via ndo_get_vf_config (git-fixes).\n- ionic: remove the dbid_inuse bitmap (git-fixes).\n- ionic: replace set_vf data with union (git-fixes).\n- ionic: start watchdog after all is setup (git-fixes).\n- ionic: stretch heartbeat detection (git-fixes).\n- io_uring: add more locking annotations for submit (bsc#1199011).\n- io_uring: avoid touching inode in rw prep (bsc#1199011).\n- io_uring: be smarter about waking multiple CQ ring waiters (bsc#1199011).\n- io_uring: cache __io_free_req()\u0027d requests (bsc#1199011).\n- io_uring: clean io-wq callbacks (bsc#1199011).\n- io_uring: clean up tctx_task_work() (bsc#1199011).\n- io_uring: deduplicate open iopoll check (bsc#1199011).\n- io_uring: do not halt iopoll too early (bsc#1199011).\n- io_uring: drop exec checks from io_req_task_submit (bsc#1199011).\n- io_uring: extract a helper for ctx quiesce (bsc#1199011).\n- io_uring: Fix undefined-behaviour in io_issue_sqe (bsc#1199011).\n- io_uring: improve ctx hang handling (bsc#1199011).\n- io_uring: inline fixed part of io_file_get() (bsc#1199011).\n- io_uring: inline io_free_req_deferred (bsc#1199011).\n- io_uring: inline io_poll_remove_waitqs (bsc#1199011).\n- io_uring: inline struct io_comp_state (bsc#1199011).\n- io_uring: kill unused IO_IOPOLL_BATCH (bsc#1199011).\n- io_uring: move io_fallback_req_func() (bsc#1199011).\n- io_uring: move io_put_task() definition (bsc#1199011).\n- io_uring: move io_rsrc_node_alloc() definition (bsc#1199011).\n- io_uring: optimise io_cqring_wait() hot path (bsc#1199011).\n- io_uring: optimise putting task struct (bsc#1199011).\n- io_uring: refactor io_alloc_req (bsc#1199011).\n- io_uring: remove extra argument for overflow flush (bsc#1199011).\n- io_uring: remove file batch-get optimisation (bsc#1199011).\n- io_uring: remove IRQ aspect of io_ring_ctx completion lock (bsc#1199011).\n- io_uring: remove redundant args from cache_free (bsc#1199011).\n- io_uring: remove unnecessary PF_EXITING check (bsc#1199011).\n- io_uring: rename io_file_supports_async() (bsc#1199011).\n- io_uring: run linked timeouts from task_work (bsc#1199011).\n- io_uring: run regular file completions from task_work (bsc#1199011).\n- io_uring: run timeouts from task_work (bsc#1199011).\n- io_uring: use inflight_entry instead of compl.list (bsc#1199011).\n- io_uring: use kvmalloc for fixed files (bsc#1199011).\n- io-wq: get rid of FIXED worker flag (bsc#1199011).\n- io-wq: make worker creation resilient against signals (bsc#1199011).\n- io-wq: move nr_running and worker_refs out of wqe-\u003elock protection (bsc#1199011).\n- io-wq: only exit on fatal signals (bsc#1199011).\n- io-wq: provide a way to limit max number of workers (bsc#1199011).\n- io-wq: split bounded and unbounded work into separate lists (bsc#1199011).\n- io-wq: wqe and worker locks no longer need to be IRQ safe (bsc#1199011).\n- ipc/sem: do not sleep with a spin lock held (bsc#1198412).\n- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).\n- ipmi: bail out if init_srcu_struct fails (git-fixes).\n- ipmi: Fix pr_fmt to avoid compilation issues (git-fixes).\n- ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module (git-fixes).\n- ipmi:ssif: Check for NULL msg when handling events and messages (git-fixes).\n- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).\n- ipw2x00: Fix potential NULL dereference in libipw_xmit() (git-fixes).\n- irqchip/armada-370-xp: Do not touch Performance Counter Overflow on A375, A38x, A39x (git-fixes).\n- irqchip/aspeed-i2c-ic: Fix irq_of_parse_and_map() return value (git-fixes).\n- irqchip/aspeed-scu-ic: Fix irq_of_parse_and_map() return value (git-fixes).\n- irqchip/exiu: Fix acknowledgment of edge triggered interrupts (git-fixes).\n- irqchip/gic, gic-v3: Prevent GSI to SGI translations (git-fixes).\n- irqchip/gic/realview: Fix refcount leak in realview_gic_of_init (git-fixes).\n- irqchip/gic-v3: Ensure pseudo-NMIs have an ISB between ack and handling (git-fixes).\n- irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions (git-fixes).\n- irqchip/gic-v3: Fix GICR_CTLR.RWP polling (git-fixes).\n- irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions (git-fixes).\n- irqchip/gic-v4: Wait for GICR_VPENDBASER.Dirty to clear before descheduling (git-fixes).\n- irqchip: irq-xtensa-mx: fix initial IRQ affinity (git-fixes).\n- irqchip/nvic: Release nvic_base upon failure (git-fixes).\n- irqchip/qcom-pdc: Fix broken locking (git-fixes).\n- irqchip/realtek-rtl: Fix refcount leak in map_interrupts (git-fixes).\n- irqchip/realtek-rtl: Service all pending interrupts (git-fixes).\n- isdn: hfcpci: check the return value of dma_set_mask() in setup_hw() (git-fixes).\n- ivtv: fix incorrect device_caps for ivtvfb (git-fixes).\n- iwlwifi: do not advertise TWT support (git-fixes).\n- iwlwifi: Fix -EIO error code that is never returned (git-fixes).\n- iwlwifi: fix use-after-free (git-fixes).\n- iwlwifi: iwl-dbg: Use del_timer_sync() before freeing (git-fixes).\n- iwlwifi: mvm: align locking in D3 test debugfs (git-fixes).\n- iwlwifi: mvm: check debugfs_dir ptr before use (git-fixes).\n- iwlwifi: mvm: Correctly set fragmented EBS (git-fixes).\n- iwlwifi: mvm: Do not call iwl_mvm_sta_from_mac80211() with NULL sta (git-fixes).\n- iwlwifi: mvm: do not crash on invalid rate w/o STA (git-fixes).\n- iwlwifi: mvm: do not iterate unadded vifs when handling FW SMPS req (git-fixes).\n- iwlwifi: mvm: do not send SAR GEO command for 3160 devices (git-fixes).\n- iwlwifi: mvm: Fix an error code in iwl_mvm_up() (git-fixes).\n- iwlwifi: mvm: fix assert 1F04 upon reconfig (git-fixes).\n- iwlwifi: mvm: move only to an enabled channel (git-fixes).\n- iwlwifi: pcie: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: pcie: gen2: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: yoyo: remove DBGI_SRAM address reset writing (git-fixes).\n- ixgbe: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- ixgbe: ensure IPsec VF - PF compatibility (git-fixes).\n- ixgbe: respect metadata on XSK Rx to skb (git-fixes).\n- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).\n- jbd2: Fake symbols defined under CONFIG_JBD2_DEBUG (bsc#1198971).\n- jfs: fix divide error in dbNextAG (bsc#1200828).\n- kABI: Fix kABI after \u0027x86/mm/cpa: Generalize __set_memory_enc_pgtable()\u0027 (jsc#SLE-19924).\n- kABI fix of sysctl_run_estimation (git-fixes).\n- kABI: fix rndis_parameters locking (git-fixes).\n- kABI: ivtv: restore caps member (git-fixes).\n- kabi/severities: allow dropping a few invalid exported symbols (bsc#1201218)\n- kabi/severities: Ignore arch/x86/kvm except for kvm_x86_ops Handle this like in previous SLE kernels.\n- kABI workaround for fxls8962af iio accel drivers (git-fixes).\n- kABI workaround for pci quirks (git-fixes).\n- kconfig: fix failing to generate auto.conf (git-fixes).\n- kconfig: let \u0027shell\u0027 return enough output for deep path names (git-fixes).\n- kernel/fork: Initialize mm\u0027s PASID (jsc#SLE-24350).\n- kernel/resource: Introduce request_mem_region_muxed() (git-fixes).\n- kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add] (git-fixes).\n- KEYS: asymmetric: enforce that sig algo matches key algo (git-fixes).\n- KEYS: asymmetric: properly validate hash_algo and encoding (git-fixes).\n- KEYS: fix length validation in keyctl_pkey_params_get_2() (git-fixes).\n- KEYS: trusted: Avoid calling null function trusted_key_exit (git-fixes).\n- KEYS: trusted: Fix trusted key backends when building as module (git-fixes).\n- KEYS: trusted: tpm2: Fix migratable logic (git-fixes).\n- kprobes: Add kretprobe_find_ret_addr() for searching return address (bsc#1193277).\n- kprobes: Enable stacktrace from pt_regs in kretprobe handler (bsc#1193277).\n- kprobes: treewide: Cleanup the error messages for kprobes (bsc#1193277).\n- kprobes: treewide: Make it harder to refer kretprobe_trampoline directly (bsc#1193277).\n- kprobes: treewide: Remove trampoline_address from kretprobe_trampoline_handler() (bsc#1193277).\n- kprobes: treewide: Replace arch_deref_entry_point() with dereference_symbol_descriptor() (bsc#1193277).\n- kprobes: treewide: Use \u0027kprobe_opcode_t *\u0027 for the code address in get_optimized_kprobe() (bsc#1193277).\n- kselftest/arm64: bti: force static linking (git-fixes).\n- kunit: tool: Import missing importlib.abc (git-fixes).\n- KVM: arm64: Avoid consuming a stale esr value when SError occur (git-fixes).\n- KVM: arm64: Drop unused workaround_flags vcpu field (git-fixes).\n- KVM: arm64: pkvm: Use the mm_ops indirection for cache maintenance (git-fixes).\n- KVM: arm64: Use shadow SPSR_EL1 when injecting exceptions on !VHE (git-fixes).\n- KVM: Clean up benign vcpu-\u003ecpu data races when kicking vCPUs (git-fixes).\n- KVM: Ensure local memslot copies operate on up-to-date arch-specific data (git-fixes).\n- KVM: fix wrong exception emulation in check_rdtsc (git-fixes).\n- KVM: LAPIC: Drop pending LAPIC timer injection when canceling the timer (git-fixes).\n- KVM: nVMX: Abide to KVM_REQ_TLB_FLUSH_GUEST request on nested vmentry/vmexit (git-fixes).\n- KVM: nVMX: Clear IDT vectoring on nested VM-Exit for double/triple fault (git-fixes).\n- KVM: nVMX: Do not clear CR3 load/store exiting bits if L1 wants \u0027em (git-fixes).\n- KVM: nVMX: Emulate guest TLB flush on nested VM-Enter with new vpid12 (git-fixes).\n- KVM: nVMX: Ensure vCPU honors event request if posting nested IRQ fails (git-fixes).\n- KVM: nVMX: Flush current VPID (L1 vs. L2) for KVM_REQ_TLB_FLUSH_GUEST (git-fixes).\n- KVM: nVMX: Leave most VM-Exit info fields unmodified on failed VM-Entry (git-fixes).\n- KVM: PPC: Fix TCE handling for VFIO (bsc#1061840 git-fixes).\n- KVM: s390: Ensure kvm_arch_no_poll() is read once when blocking vCPU (git-fixes).\n- KVM: s390: pv: add macros for UVC CC values (git-fixes).\n- KVM: s390: pv: avoid stalls when making pages secure (git-fixes).\n- KVM: s390: vsie/gmap: reduce gmap_rmap overhead (git-fixes).\n- KVM: selftests: Do not skip L2\u0027s VMCALL in SMM test for SVM guest (bsc#1194523).\n- KVM: selftests: Re-enable access_tracking_perf_test (bsc#1194526).\n- KVM: SEV: accept signals in sev_lock_two_vms (bsc#1194526).\n- KVM: SEV: do not take kvm-\u003elock when destroying (bsc#1194526).\n- KVM: SEV: Fall back to vmalloc for SEV-ES scratch area if necessary (bsc#1194526).\n- KVM: SEV: Mark nested locking of kvm-\u003elock (bsc#1194526).\n- KVM: SEV: Return appropriate error codes if SEV-ES scratch setup fails (bsc#1194526).\n- KVM: SVM: Allow AVIC support on system w/ physical APIC ID \u003e 255 (bsc#1193823).\n- KVM: SVM: Do not terminate SEV-ES guests on GHCB validation failure (bsc#1194526).\n- KVM: SVM: drop unnecessary code in svm_hv_vmcb_dirty_nested_enlightenments() (git-fixes).\n- KVM: SVM: Emulate #INIT in response to triple fault shutdown (git-fixes).\n- KVM: SVM: Fix kvm_cache_regs.h inclusions for is_guest_mode() (git-fixes).\n- KVM: SVM: hyper-v: Enable Enlightened MSR-Bitmap support for real (git-fixes).\n- KVM: SVM: Never reject emulation due to SMAP errata for !SEV guests (git-fixes).\n- KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak (git-fixes).\n- KVM: VMX: Do not unblock vCPU w/ Posted IRQ if IRQs are disabled in guest (git-fixes).\n- KVM: VMX: Fold ept_update_paging_mode_cr0() back into vmx_set_cr0() (git-fixes).\n- KVM: VMX: Invert handling of CR0.WP for EPT without unrestricted guest (git-fixes).\n- KVM: VMX: Read Posted Interrupt \u0027control\u0027 exactly once per loop iteration (git-fixes).\n- KVM: VMX: Refresh list of user return MSRs after setting guest CPUID (git-fixes).\n- KVM: VMX: Remove defunct \u0027nr_active_uret_msrs\u0027 field (git-fixes).\n- KVM: VMX: Set failure code in prepare_vmcs02() (git-fixes).\n- KVM: VMX: Skip pointless MSR bitmap update when setting EFER (git-fixes).\n- KVM: VMX: Wake vCPU when delivering posted IRQ even if vCPU == this vCPU (git-fixes).\n- KVM: x86: Assume a 64-bit hypercall for guests with protected state (git-fixes).\n- kvm: x86/cpuid: Only provide CPUID leaf 0xA if host has architectural PMU (git-fixes).\n- KVM: x86: Do not force set BSP bit when local APIC is managed by userspace (git-fixes).\n- KVM: x86: Do not mark all registers as avail/dirty during RESET/INIT (git-fixes).\n- KVM: x86: do not print when fail to read/write pv eoi memory (git-fixes).\n- KVM: x86: Drop guest CPUID check for host initiated writes to MSR_IA32_PERF_CAPABILITIES (git-fixes).\n- KVM: x86: Drop WARNs that assert a triple fault never \u0027escapes\u0027 from L2 (git-fixes).\n- KVM: x86/emulator: Defer not-present segment check in __load_segment_descriptor() (git-fixes).\n- KVM: X86: Ensure that dirty PDPTRs are loaded (git-fixes).\n- KVM: x86: Exit to userspace if emulation prepared a completion callback (git-fixes).\n- KVM: x86: Fix emulation in writing cr8 (git-fixes).\n- KVM: X86: Fix missed remote tlb flush in rmap_write_protect() (git-fixes).\n- KVM: x86: Fix uninitialized eoi_exit_bitmap usage in vcpu_load_eoi_exitmap() (git-fixes).\n- KVM: x86: Handle 32-bit wrap of EIP for EMULTYPE_SKIP with flat code seg (git-fixes).\n- KVM: x86: hyper-v: Fix the maximum number of sparse banks for XMM fast TLB flush hypercalls (git-fixes).\n- KVM: x86: Ignore sparse banks size for an \u0027all CPUs\u0027, non-sparse IPI req (git-fixes).\n- KVM: x86: Mark all registers as avail/dirty at vCPU creation (git-fixes).\n- KVM: x86: Migrate the PIT only if vcpu0 is migrated, not any BSP (git-fixes).\n- KVM: x86/mmu: Check for present SPTE when clearing dirty bit in TDP MMU (git-fixes).\n- KVM: x86/mmu: Complete prefetch for trailing SPTEs for direct, legacy MMU (git-fixes).\n- KVM: x86/mmu: Fix TLB flush range when handling disconnected pt (git-fixes).\n- KVM: x86/mmu: Fix write-protection of PTs mapped by the TDP MMU (git-fixes).\n- KVM: x86/mmu: Passing up the error state of mmu_alloc_shadow_roots() (git-fixes).\n- KVM: x86/mmu: Pass parameter flush as false in kvm_tdp_mmu_zap_collapsible_sptes() (git-fixes).\n- KVM: x86/mmu: Remove spurious TLB flushes in TDP MMU zap collapsible path (git-fixes).\n- KVM: x86/mmu: Skip tlb flush if it has been done in zap_gfn_range() (git-fixes).\n- KVM: x86/mmu: Update number of zapped pages even if page list is stable (git-fixes).\n- KVM: x86/mmu: Use yield-safe TDP MMU root iter in MMU notifier unmapping (git-fixes).\n- KVM: x86: nSVM: restore the L1 host state prior to resuming nested guest on SMM exit (git-fixes).\n- KVM: x86: nSVM: skip eax alignment check for non-SVM instructions (git-fixes).\n- KVM: x86: nSVM: test eax for 4K alignment for GP errata workaround (git-fixes).\n- KVM: x86: Pend KVM_REQ_APICV_UPDATE during vCPU creation to fix a race (git-fixes).\n- KVM: x86/pmu: Fix reserved bits for AMD PerfEvtSeln register (git-fixes).\n- KVM: x86/pmu: Use AMD64_RAW_EVENT_MASK for PERF_TYPE_RAW (git-fixes).\n- KVM: x86: Register Processor Trace interrupt hook iff PT enabled in guest (git-fixes).\n- KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs (git-fixes).\n- KVM: x86: SVM: do not set VMLOAD/VMSAVE intercepts on vCPU reset (git-fixes).\n- KVM: x86: SVM: fix avic spec based definitions again (bsc#1193823 jsc#SLE-24549).\n- KVM: x86: SVM: move avic definitions from AMD\u0027s spec to svm.h (bsc#1193823 jsc#SLE-24549).\n- KVM: X86: Synchronize the shadow pagetable before link it (git-fixes).\n- KVM: x86: Update vCPU\u0027s runtime CPUID on write to MSR_IA32_XSS (git-fixes).\n- KVM: x86: Wait for IPIs to be delivered when handling Hyper-V TLB flush hypercall (git-fixes).\n- lib: bitmap: fix many kernel-doc warnings (git-fixes).\n- libbpf: Free up resources used by inner map definition (git-fixes).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (git-fixes).\n- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).\n- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).\n- list: fix a data-race around ep-\u003erdllist (git-fixes).\n- list: introduce list_is_head() helper and re-use it in list.h (git-fixes).\n- list: test: Add a test for list_is_head() (git-fixes).\n- livepatch: Do not block removal of patches that are safe to unload (bsc#1071995).\n- locking: Make owner_on_cpu() into linux/sched.h (bsc#1190137 bsc#1189998).\n- locking: Remove rt_rwlock_is_contended() (bsc#1190137 bsc#1189998).\n- locking/rtmutex: Add rt_mutex_lock_nest_lock() and rt_mutex_lock_killable() (bsc#1190137 bsc#1189998).\n- locking/rtmutex: Squash self-deadlock check for ww_rt_mutex (bsc#1190137 bsc#1189998).\n- locking/rwlocks: introduce write_lock_nested (bsc#1189998).\n- LSM: general protection fault in legacy_parse_param (git-fixes).\n- lz4: fix LZ4_decompress_safe_partial read out of bound (git-fixes).\n- mac80211: fix EAPoL rekey fail in 802.3 rx path (git-fixes).\n- mac80211: fix forwarded mesh frames AC and queue selection (git-fixes).\n- mac80211: fix potential double free on mesh join (git-fixes).\n- mac80211: fix rx reordering with non explicit / psmp ack policy (git-fixes).\n- mac80211_hwsim: call ieee80211_tx_prepare_skb under RCU protection (git-fixes).\n- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).\n- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).\n- mac80211: minstrel_ht: fix where rate stats are stored (fixes debugfs output) (git-fixes).\n- mac80211: mlme: check for null after calling kmemdup (git-fixes).\n- mac80211: refuse aggregations sessions before authorized (git-fixes).\n- mac80211: Remove a couple of obsolete TODO (git-fixes).\n- mac80211: Reset MBSSID parameters upon connection (git-fixes).\n- mac80211: treat some SAE auth steps as final (git-fixes).\n- mac80211: upgrade passive scan to active scan on DFS channels after beacon rx (git-fixes).\n- macros.kernel-source: Fix conditional expansion. Fixes: bb95fef3cf19 (\u0027rpm: Use bash for %() expansion (jsc#SLE-18234).\u0027)\n- macvlan: Fix leaking skb in source mode with nodst option (git-fixes).\n- mailbox: change mailbox-mpfs compatible string (git-fixes).\n- mailbox: imx: fix crash in resume on i.mx8ulp (git-fixes).\n- mailbox: imx: fix wakeup failure from freeze mode (git-fixes).\n- mailbox: tegra-hsp: Flush whole channel (git-fixes).\n- maple: fix wrong return value of maple_bus_init() (git-fixes).\n- md: Do not set mddev private to NULL in raid0 pers-\u003efree (git-fixes).\n- md: fix an incorrect NULL check in does_sb_need_changing (git-fixes).\n- md: fix an incorrect NULL check in md_reload_sb (git-fixes).\n- md: fix double free of io_acct_set bioset (git-fixes).\n- md: fix update super 1.0 on rdev size change (git-fixes).\n- md: Move alloc/free acct bioset in to personality (git-fixes).\n- md/raid5: play nice with PREEMPT_RT (bsc#1189998).\n- media: aspeed: Correct value for h-total-pixels (git-fixes).\n- media: atmel: atmel-isc-base: report frame sizes as full supported range (git-fixes).\n- media: atmel: atmel-isc: Fix PM disable depth imbalance in atmel_isc_probe (git-fixes).\n- media: atmel: atmel-sama5d2-isc: fix wrong mask in YUYV format check (git-fixes).\n- media: atmel: atmel-sama7g5-isc: fix ispck leftover (git-fixes).\n- media: atomisp: fix bad usage at error handling logic (git-fixes).\n- media: atomisp: fix dummy_ptr check to avoid duplicate active_bo (git-fixes).\n- media: atomisp_gmin_platform: Add DMI quirk to not turn AXP ELDO2 regulator off on some boards (git-fixes).\n- media: bttv: fix WARNING regression on tunerless devices (git-fixes).\n- media: camss: csid-170: do not enable unused irqs (git-fixes).\n- media: camss: csid-170: fix non-10bit formats (git-fixes).\n- media: camss: csid-170: remove stray comment (git-fixes).\n- media: camss: csid-170: set the right HALT_CMD when disabled (git-fixes).\n- media: camss: vfe-170: fix \u0027VFE halt timeout\u0027 error (git-fixes).\n- media: ccs-core.c: fix failure to call clk_disable_unprepare (git-fixes).\n- media: cec-adap.c: fix is_configuring state (git-fixes).\n- media: cedrus: h264: Fix neighbour info buffer size (git-fixes).\n- media: cedrus: H265: Fix neighbour info buffer size (git-fixes).\n- media: coda: Fix missing put_device() call in coda_get_vdoa_data (git-fixes).\n- media: cx25821: Fix the warning when removing the module (git-fixes).\n- media: cx88-mpeg: clear interrupt status register before streaming video (git-fixes).\n- media: davinci: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).\n- media: davinci: vpif: fix unbalanced runtime PM enable (git-fixes).\n- media: davinci: vpif: fix unbalanced runtime PM get (git-fixes).\n- media: davinci: vpif: fix use-after-free on driver unbind (git-fixes).\n- media: doc: pixfmt-rgb: Fix V4L2_PIX_FMT_BGR24 format description (git-fixes).\n- media: doc: pixfmt-yuv: Fix V4L2-PIX-FMT-Y10P format (git-fixes).\n- media: em28xx: initialize refcount before kref_get (git-fixes).\n- media: gpio-ir-tx: fix transmit with long spaces on Orange Pi PC (git-fixes).\n- media: hantro: Empty encoder capture buffers by default (git-fixes).\n- media: hantro: Fix overfill bottom register field name (git-fixes).\n- media: hantro: HEVC: Fix tile info buffer value computation (git-fixes).\n- media: hantro: HEVC: unconditionnaly set pps_{cb/cr}_qp_offset values (git-fixes).\n- media: hdpvr: initialize dev-\u003eworker at hdpvr_register_videodev (git-fixes).\n- media: i2c: max9286: fix kernel oops when removing module (git-fixes).\n- media: i2c: max9286: Use dev_err_probe() helper (git-fixes).\n- media: i2c: max9286: Use \u0027maxim,gpio-poc\u0027 property (git-fixes).\n- media: i2c: ov5648: Fix lockdep error (git-fixes).\n- media: i2c: ov5648: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).\n- media: i2c: rdacm2x: properly set subdev entity function (git-fixes).\n- media: imon: reorganize serialization (git-fixes).\n- media: imx-jpeg: fix a bug of accessing array out of bounds (git-fixes).\n- media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers (git-fixes).\n- media: iommu/mediatek: Add device_link between the consumer and the larb devices (git-fixes).\n- media: iommu/mediatek: Return ENODEV if the device is NULL (git-fixes).\n- media: iommu/mediatek-v1: Free the existed fwspec if the master dev already has (git-fixes).\n- media: ir_toy: free before error exiting (git-fixes).\n- media: media-entity.h: Fix documentation for media_create_intf_link (git-fixes).\n- media: mexon-ge2d: fixup frames size in registers (git-fixes).\n- media: mtk-vcodec: potential dereference of null pointer (git-fixes).\n- media: omap3isp: Use struct_group() for memcpy() region (git-fixes).\n- media: ov5640: Fix set format, v4l2_mbus_pixelcode not updated (git-fixes).\n- media: ov5648: Do not pack controls struct (git-fixes).\n- media: ov6650: Add try support to selection API operations (git-fixes).\n- media: ov6650: Fix crop rectangle affected by set format (git-fixes).\n- media: ov6650: Fix set format try processing path (git-fixes).\n- media: ov7670: remove ov7670_power_off from ov7670_remove (git-fixes).\n- media: pci: cx23885: Fix the error handling in cx23885_initdev() (git-fixes).\n- media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init (git-fixes).\n- media: Revert \u0027media: em28xx: add missing em28xx_close_extension\u0027 (git-fixes).\n- media: rga: fix possible memory leak in rga_probe (git-fixes).\n- media: rkvdec: h264: Fix bit depth wrap in pps packet (git-fixes).\n- media: rkvdec: h264: Fix dpb_valid implementation (git-fixes).\n- media: rkvdec: Stop overclocking the decoder (git-fixes).\n- media: rockchip/rga: do proper error checking in probe (git-fixes).\n- media: saa7134: fix incorrect use to determine if list is empty (git-fixes).\n- media: staging: media: imx: imx7-mipi-csis: Make subdev name unique (git-fixes).\n- media: staging: media: rkvdec: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).\n- media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com (git-fixes).\n- media: staging: media: zoran: fix usage of vb2_dma_contig_set_max_seg_size (git-fixes).\n- media: staging: media: zoran: fix various V4L2 compliance errors (git-fixes).\n- media: staging: media: zoran: move videodev alloc (git-fixes).\n- media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED (git-fixes).\n- media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() (git-fixes).\n- media: usb: go7007: s2250-board: fix leak in probe() (git-fixes).\n- media: uvcvideo: Fix missing check to determine if element is found in list (git-fixes).\n- media: v4l2-core: Initialize h264 scaling matrix (git-fixes).\n- media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls (git-fixes).\n- media: v4l: Avoid unaligned access warnings when printing 4cc modifiers (git-fixes).\n- media: venus: hfi: avoid null dereference in deinit (git-fixes).\n- media: venus: hfi_cmds: List HDR10 property as unsupported for v1 and v3 (git-fixes).\n- media: videobuf2: Fix the size printk format (git-fixes).\n- media: video/hdmi: handle short reads of hdmi info frame (git-fixes).\n- media: vidtv: Check for null return of vzalloc (git-fixes).\n- mei: avoid iterator usage outside of list_for_each_entry (git-fixes).\n- mei: hbm: drop capability response on early shutdown (git-fixes).\n- mei: me: add Alder Lake N device id (git-fixes).\n- mei: me: add raptor lake point S DID (git-fixes).\n- mei: me: disable driver on the ign firmware (git-fixes).\n- memblock: fix memblock_phys_alloc() section mismatch error (git-fixes).\n- memory: atmel-ebi: Fix missing of_node_put in atmel_ebi_probe (git-fixes).\n- memory: emif: Add check for setup_interrupts (git-fixes).\n- memory: emif: check the pointer temp in get_device_details() (git-fixes).\n- memory: fsl_ifc: populate child nodes of buses and mfd devices (git-fixes).\n- memory: mtk-smi: Add error handle for smi_probe (git-fixes).\n- memory: renesas-rpc-if: Fix HF/OSPI data transfer in Manual Mode (git-fixes).\n- memory: renesas-rpc-if: fix platform-device leak in error path (git-fixes).\n- memory: samsung: exynos5422-dmc: Avoid some over memory allocation (git-fixes).\n- memory: samsung: exynos5422-dmc: Fix refcount leak in of_get_dram_timings (git-fixes).\n- mfd: asic3: Add missing iounmap() on error asic3_mfd_probe (git-fixes).\n- mfd: davinci_voicecodec: Fix possible null-ptr-deref davinci_vc_probe() (git-fixes).\n- mfd: exynos-lpass: Drop unneeded syscon.h include (git-fixes).\n- mfd: ipaq-micro: Fix error check return value of platform_get_irq() (git-fixes).\n- mfd: mc13xxx: Add check for mc13xxx_irq_request (git-fixes).\n- mgag200 fix memmapsl configuration in GCTL6 register (git-fixes).\n- misc: alcor_pci: Fix an error handling path (git-fixes).\n- misc: atmel-ssc: Fix IRQ check in ssc_probe (git-fixes).\n- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).\n- misc: fastrpc: fix an incorrect NULL check on list iterator (git-fixes).\n- misc: ocxl: fix possible double free in ocxl_file_register_afu (git-fixes).\n- misc: rtsx: set NULL intfdata when probe fails (git-fixes).\n- misc: sgi-gru: Do not cast parameter in bit operations (git-fixes).\n- mISDN: Fix memory leak in dsp_pipeline_build() (git-fixes).\n- mlx5: kabi protect lag_mp (git-fixes).\n- mlxsw: spectrum: Protect driver from buggy firmware (git-fixes).\n- mm: Add fault_in_subpage_writeable() to probe at sub-page granularity (git-fixes)\n- mmc: block: Check for errors after write on SPI (git-fixes).\n- mmc: block: fix read single on recovery logic (git-fixes).\n- mmc: core: Allows to override the timeout value for ioctl() path (git-fixes).\n- mmc: core: Fixup support for writeback-cache for eMMC and SD (git-fixes).\n- mmc: core: Set HS clock speed before sending HS CMD13 (git-fixes).\n- mmc: core: Wait for command setting \u0027Power Off Notification\u0027 bit to complete (git-fixes).\n- mmc: davinci_mmc: Handle error for clk_enable (git-fixes).\n- mm: Change CONFIG option for mm-\u003epasid field (jsc#SLE-24350).\n- mmc: host: Return an error when -\u003eenable_sdio_irq() ops is missing (git-fixes).\n- mmc: jz4740: Apply DMA engine limits to maximum segment size (git-fixes).\n- mm/cma: provide option to opt out from exposing pages on activation failure (bsc#1195099 ltc#196102).\n- mmc: mediatek: wait dma stop bit reset to 0 (git-fixes).\n- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).\n- mmc: mmci: stm32: correctly check all elements of sg list (git-fixes).\n- mmc: renesas_sdhi: do not overwrite TAP settings when HS400 tuning is complete (git-fixes).\n- mmc: rtsx: add 74 Clocks in power on flow (git-fixes).\n- mmc: rtsx: Fix build errors/warnings for unused variable (git-fixes).\n- mmc: rtsx: Let MMC core handle runtime PM (git-fixes).\n- mmc: rtsx: Use pm_runtime_{get,put}() to handle runtime PM (git-fixes).\n- mmc: sdhci_am654: Fix the driver data of AM64 SoC (git-fixes).\n- mmc: sdhci-msm: Reset GCC_SDCC_BCR register for SDHC (git-fixes).\n- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).\n- mmc: sdhci-pci-o2micro: Fix card detect by dealing with debouncing (git-fixes).\n- mmc: sunxi-mmc: Fix DMA descriptors allocated above 32 bits (git-fixes).\n- mm: fs: fix lru_cache_disabled race in bh_lru (bsc#1197761).\n- mm: Fully initialize invalidate_lock, amend lock class later (bsc#1197921).\n- mm: memcg: synchronize objcg lists with a dedicated spinlock (bsc#1198402).\n- mm/page_alloc: always attempt to allocate at least one page during bulk allocation (git fixes (mm/pgalloc)).\n- mm/page_alloc.c: do not warn allocation failure on zone DMA if no managed pages (bsc#1197501).\n- mm, page_alloc: fix build_zonerefs_node() (git-fixes).\n- mm/scatterlist: replace the !preemptible warning in sg_miter_stop() (bsc#1189998).\n- mm/slub: add missing TID updates on slab deactivation (git-fixes).\n- mm, thp: fix incorrect unmap behavior for private pages (bsc#1198024).\n- mm, thp: lock filemap when truncating page cache (bsc#1198023).\n- mm/vmalloc: fix comments about vmap_area struct (git-fixes).\n- mm_zone: add function to check if managed dma zone exists (bsc#1197501).\n- modpost: fix removing numeric suffixes (git-fixes).\n- modpost: fix section mismatch check for exported init/exit sections (git-fixes).\n- modpost: fix undefined behavior of is_arm_mapping_symbol() (git-fixes).\n- modpost: restore the warning message for missing symbol versions (git-fixes).\n- Move upstreamed ALSA fix into sorted section\n- Move upstreamed x86 patches into sorted section\n- mptcp: add missing documented NL params (git-fixes).\n- mt76: connac: fix sta_rec_wtbl tag len (git-fixes).\n- mt76: dma: initialize skip_unmap in mt76_dma_rx_fill (git-fixes).\n- mt76: do not attempt to reorder received 802.3 packets without agg session (git-fixes).\n- mt76: fix encap offload ethernet type check (git-fixes).\n- mt76: fix monitor mode crash with sdio driver (git-fixes).\n- mt76: Fix undefined behavior due to shift overflowing the constant (git-fixes).\n- mt76: mt7603: check sta_rates pointer in mt7603_sta_rate_tbl_update (git-fixes).\n- mt76: mt7615: check sta_rates pointer in mt7615_sta_rate_tbl_update (git-fixes).\n- mt76: mt7615: fix a leftover race in runtime-pm (git-fixes).\n- mt76: mt7615: Fix assigning negative values to unsigned variable (git-fixes).\n- mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU (git-fixes).\n- mt76: mt7915: use proper aid value in mt7915_mcu_sta_basic_tlv (git-fixes).\n- mt76: mt7915: use proper aid value in mt7915_mcu_wtbl_generic_tlv in sta mode (git-fixes).\n- mt76: mt7921: accept rx frames with non-standard VHT MCS10-11 (git-fixes).\n- mt76: mt7921e: fix possible probe failure after reboot (bsc#1198835).\n- mt76: mt7921: fix a leftover race in runtime-pm (git-fixes).\n- mt76: mt7921: fix crash when startup fails (git-fixes).\n- mt76: mt7921: fix mt7921_queues_acq implementation (git-fixes).\n- mt76: mt7921: Fix the error handling path of mt7921_pci_probe() (git-fixes).\n- mtd: cfi_cmdset_0002: Move and rename chip_check/chip_ready/chip_good_for_write (git-fixes).\n- mtd: mchp23k256: Add SPI ID table (git-fixes).\n- mtd: mchp48l640: Add SPI ID table (git-fixes).\n- mtd: onenand: Check for error irq (git-fixes).\n- mtd: parsers: qcom: Fix kernel panic on skipped partition (git-fixes).\n- mtd: parsers: qcom: Fix missing free for pparts in cleanup (git-fixes).\n- mtd: phram: Prevent divide by zero bug in phram_setup() (git-fixes).\n- mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init (git-fixes).\n- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).\n- mtd: rawnand: cadence: fix possible null-ptr-deref in cadence_nand_dt_probe() (git-fixes).\n- mtd: rawnand: denali: Use managed device resources (git-fixes).\n- mtd: rawnand: fix ecc parameters for mt7622 (git-fixes).\n- mtd: rawnand: Fix return value check of wait_for_completion_timeout (git-fixes).\n- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).\n- mtd: rawnand: gpmi: fix controller timings setting (git-fixes).\n- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).\n- mtd: rawnand: ingenic: Fix missing put_device in ingenic_ecc_get (git-fixes).\n- mtd: rawnand: intel: fix possible null-ptr-deref in ebu_nand_probe() (git-fixes).\n- mtd: rawnand: pl353: Set the nand chip node as the flash node (git-fixes).\n- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).\n- mtd: rawnand: qcom: fix memory corruption that causes panic (git-fixes).\n- mtd: spinand: gigadevice: fix Quad IO for GD5F1GQ5UExxG (git-fixes).\n- mtd: spi-nor: core: Check written SR value in spi_nor_write_16bit_sr_and_check() (git-fixes).\n- mwifiex: add mutex lock for call in mwifiex_dfs_chan_sw_work_queue (git-fixes).\n- n64cart: convert bi_disk to bi_bdev-\u003ebd_disk fix build (git-fixes).\n- natsemi: sonic: stop calling netdev_boot_setup_check (git-fixes).\n- net: asix: add proper error handling of usb read errors (git-fixes).\n- net: atlantic: Avoid out-of-bounds indexing (git-fixes).\n- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).\n- net: axienet: setup mdio unconditionally (git-fixes).\n- net: bnxt_ptp: fix compilation error (bsc#1199736).\n- net: dev: Always serialize on Qdisc::busylock in __dev_xmit_skb() on PREEMPT_RT (bsc#1189998).\n- net: dev: Change the order of the arguments for the contended condition (bsc#1189998).\n- net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove (git-fixes).\n- net: ethernet: lantiq_etop: fix build errors/warnings (git-fixes).\n- net: ethernet: mediatek: add missing of_node_put() in mtk_sgmii_init() (git-fixes).\n- net: ethernet: mtk_eth_soc: fix misuse of mem alloc interface netdev[napi]_alloc_frag (git-fixes).\n- net: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry() (git-fixes).\n- net: ethernet: ti: am65-cpsw-nuss: Fix some refcount leaks (git-fixes).\n- netfilter: conntrack: move synack init code to helper (bsc#1199035).\n- netfilter: conntrack: re-init state for retransmitted syn-ack (bsc#1199035).\n- netfilter: nf_conntrack_tcp: preserve liberal flag in tcp options (bsc#1199035).\n- netfilter: nf_conntrack_tcp: re-init for syn packets only (bsc#1199035).\n- net: handle ARPHRD_PIMREG in dev_is_mac_header_xmit() (git-fixes).\n- net: hns3: add NULL pointer check for hns3_set/get_ringparam() (git-fixes).\n- net: hns3: add return value for mailbox handling in PF (bsc#1190336).\n- net: hns3: add validity check for message data length (git-fixes).\n- net: hns3: add vlan list lock to protect vlan list (git-fixes).\n- net: hns3: align the debugfs output to the left (git-fixes).\n- net: hns3: clear inited state and stop client after failed to register netdev (git-fixes).\n- net: hns3: fix bug when PF set the duplicate MAC address for VFs (git-fixes).\n- net: hns3: fix phy can not link up when autoneg off and reset (git-fixes).\n- net: hns3: fix port base vlan add fail when concurrent with reset (git-fixes).\n- net: hns3: fix software vlan talbe of vlan 0 inconsistent with hardware (git-fixes).\n- net: hns3: handle empty unknown interrupt for VF (git-fixes).\n- net: hns3: modify the return code of hclge_get_ring_chain_from_mbx (git-fixes).\n- net: hns3: refine the process when PF set VF VLAN (git-fixes).\n- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).\n- net/ice: Add support for enable_iwarp and enable_roce devlink param (bsc#1200502).\n- net/ice: Fix boolean assignment (bsc#1200502).\n- net/ice: Remove unused enum (bsc#1200502).\n- net: ipa: disable HOLB drop when updating timer (git-fixes).\n- net: ipa: HOLB register sometimes must be written twice (git-fixes).\n- net/ipa: ipa_resource: Fix wrong for loop range (git-fixes).\n- net: ipv6: unexport __init-annotated seg6_hmac_init() (bsc#1201218).\n- net: ipv6: unexport __init-annotated seg6_hmac_net_init() (bsc#1201218).\n- net: macb: Align the dma and coherent dma masks (git-fixes).\n- net: mana: Add counter for packet dropped by XDP (bsc#1195651).\n- net: mana: Add counter for XDP_TX (bsc#1195651).\n- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).\n- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).\n- net: mana: Reuse XDP dropped page (bsc#1195651).\n- net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651).\n- net: marvell: mvpp2: increase MTU limit when XDP enabled (git-fixes).\n- net: marvell: prestera: fix double free issue on err path (git-fixes).\n- net: mdio: do not defer probe forever if PHY IRQ provider is missing (git-fixes).\n- net: mdio: unexport __init-annotated mdio_bus_init() (bsc#1201218).\n- net/mlx5: Avoid double clear or set of sync reset requested (git-fixes).\n- net/mlx5: Bridge, ensure dev_name is null-terminated (git-fixes).\n- net/mlx5: Bridge, Fix devlink deadlock on net namespace deletion (git-fixes).\n- net/mlx5: Bridge, take rtnl lock in init error handler (git-fixes).\n- net/mlx5: DR, Cache STE shadow memory (git-fixes).\n- net/mlx5: DR, Do not allow match on IP w/o matching on full ethertype/ip_version (git-fixes).\n- net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fte (jsc#SLE-19253).\n- net/mlx5: DR, Fix the threshold that defines when pool sync is initiated (git-fixes).\n- net/mlx5e: Add missing increment of count (jsc#SLE-19253).\n- net/mlx5e: Avoid field-overflowing memcpy() (git-fixes).\n- net/mlx5e: Avoid implicit modify hdr for decap drop rule (jsc#SLE-19253).\n- net/mlx5e: CT: Fix queued up restore put() executing after relevant ft release (git-fixes).\n- net/mlx5e: Do not treat small ceil values as unlimited in HTB offload (git-fixes).\n- net/mlx5e: Fix broken SKB allocation in HW-GRO (jsc#SLE-19253).\n- net/mlx5e: Fix handling of wrong devices during bond netevent (git-fixes).\n- net/mlx5e: Fix module EEPROM query (git-fixes).\n- net/mlx5e: Fix the calling of update_buffer_lossy() API (git-fixes).\n- net/mlx5e: Fix trust state reset in reload (git-fixes).\n- net/mlx5e: Fix wrong calculation of header index in HW_GRO (jsc#SLE-19253).\n- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).\n- net/mlx5e: Fix wrong source vport matching on tunnel rule (jsc#SLE-19253).\n- net/mlx5e: IPsec: Fix crypto offload for non TCP/UDP encapsulated traffic (git-fixes).\n- net/mlx5e: IPsec: Fix tunnel mode crypto offload for non TCP/UDP traffic (git-fixes).\n- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (git-fixes).\n- net/mlx5e: Lag, Do not skip fib events on current dst (git-fixes).\n- net/mlx5e: Lag, Fix fib_info pointer assignment (git-fixes).\n- net/mlx5e: Lag, Fix use-after-free in fib event handler (git-fixes).\n- net/mlx5e: Lag, Only handle events from highest priority multipath entry (git-fixes).\n- net/mlx5e: MPLSoUDP decap, fix check for unsupported matches (git-fixes).\n- net/mlx5e: SHAMPO, reduce TIR indication (jsc#SLE-19253).\n- net/mlx5: E-Switch, Fix uninitialized variable modact (git-fixes).\n- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).\n- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).\n- net/mlx5e: Use struct_group() for memcpy() region (git-fixes).\n- net/mlx5: Fix a race on command flush flow (git-fixes).\n- net/mlx5: Fix deadlock in sync reset flow (git-fixes).\n- net/mlx5: Fix matching on inner TTC (jsc#SLE-19253).\n- net/mlx5: Fix offloading with ESWITCH_IPV4_TTL_MODIFY_ENABLE (jsc#SLE-19253).\n- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).\n- net/mlx5: Fix size field in bufferx_reg struct (git-fixes).\n- net/mlx5: Fix slab-out-of-bounds while reading resource dump menu (git-fixes).\n- net/mlx5: Fix tc max supported prio for nic mode (git-fixes).\n- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net/mlx5: Use del_timer_sync in fw reset flow of halting poll (git-fixes).\n- net: mvmdio: fix compilation warning (git-fixes).\n- net: netvsc: remove break after return (git-fixes).\n- net: phy: ax88772a: fix lost pause advertisement configuration (git-fixes).\n- net: phy: broadcom: Fix brcm_fet_config_init() (git-fixes).\n- net: phy: correct spelling error of media in documentation (git-fixes).\n- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).\n- net: phy: dp83867: retrigger SGMII AN when link change (git-fixes).\n- net: phy: Fix race condition on link status change (git-fixes).\n- net: phy: marvell10g: fix return value on error (git-fixes).\n- net: phy: marvell: Fix invalid comparison in the resume and suspend functions (git-fixes).\n- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).\n- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).\n- net: phy: mediatek: remove PHY mode check on MT7531 (git-fixes).\n- net: phy: meson-gxl: fix interrupt handling in forced mode (git-fixes).\n- net: phy: meson-gxl: improve link-up behavior (git-fixes).\n- net: phy: micrel: Allow probing without .driver_data (git-fixes).\n- net: phy: micrel: Do not use kszphy_suspend/resume for KSZ8061 (git-fixes).\n- net: phy: micrel: Pass .probe for KS8737 (git-fixes).\n- net: phy: mscc: Add MODULE_FIRMWARE macros (git-fixes).\n- net: phy: mscc-miim: reject clause 45 register accesses (git-fixes).\n- net: qlogic: check the return value of dma_alloc_coherent() in qed_vf_hw_prepare() (git-fixes).\n- net: rose: fix UAF bugs caused by timer handler (git-fixes).\n- net: sfc: add missing xdp queue reinitialization (git-fixes).\n- net: sfc: ef10: fix memory leak in efx_ef10_mtd_probe() (git-fixes).\n- net: sfc: fix memory leak due to ptp channel (git-fixes).\n- net: sfc: fix using uninitialized xdp tx_queue (git-fixes).\n- net/smc: Avoid warning of possible recursive locking (git-fixes).\n- net/smc: fix connection leak (git-fixes).\n- net/smc: fixes for converting from \u0027struct smc_cdc_tx_pend **\u0027 to \u0027struct smc_wr_tx_pend_priv *\u0027 (git-fixes).\n- net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() (git-fixes).\n- net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server (git-fixes).\n- net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client (git-fixes).\n- net/smc: non blocking recvmsg() return -EAGAIN when no data and signal_pending (git-fixes).\n- net/smc: postpone sk_refcnt increment in connect() (git-fixes).\n- net/smc: remove redundant re-assignment of pointer link (git-fixes).\n- net/smc: Remove unused function declaration (git-fixes).\n- net/smc: Reset conn-\u003elgr when link group registration fails (git-fixes).\n- net/smc: set ini-\u003esmcrv2.ib_dev_v2 to NULL if SMC-Rv2 is unavailable (git-fixes).\n- net/smc: sync err code when tcp connection was refused (git-fixes).\n- net/smc: Transfer remaining wait queue entries during fallback (git-fixes).\n- net/smc: Transitional solution for clcsock race issue (git-fixes).\n- net/smc: Use a mutex for locking \u0027struct smc_pnettable\u0027 (git-fixes).\n- net/smc: use memcpy instead of snprintf to avoid out of bounds read (git-fixes).\n- net: stmmac: fix gcc-10 -Wrestrict warning (git-fixes).\n- net: stmmac: Fix signed/unsigned wreckage (git-fixes).\n- net: stmmac: socfpga: add runtime suspend/resume callback for stratix10 platform (git-fixes).\n- net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (git-fixes).\n- net: usb: asix: do not force pause frames support (git-fixes).\n- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (git-fixes).\n- net: usb: ax88179_178a: Fix packet receiving (git-fixes).\n- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).\n- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).\n- Netvsc: Call hv_unmap_memory() in the netvsc_device_remove() (bsc#1183682).\n- net/x25: Fix null-ptr-deref caused by x25_disconnect (git-fixes).\n- net: xfrm: unexport __init-annotated xfrm4_protocol_init() (bsc#1201218).\n- nfc: hci: fix sleep in atomic context bugs in nfc_hci_hcp_message_tx (git-fixes).\n- nfc: nci: add flush_workqueue to prevent uaf (git-fixes).\n- nfc: nci: fix sleep in atomic context bugs caused by nci_skb_alloc (git-fixes).\n- nfc: netlink: fix sleep in atomic bug when firmware download timeout (git-fixes).\n- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).\n- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).\n- nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs (git-fixes).\n- nfc: NULL out the dev-\u003erfkill to prevent UAF (git-fixes).\n- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).\n- nfc: pn533: Fix buggy cleanup order (git-fixes).\n- nfc: port100: fix use-after-free in port100_send_complete (git-fixes).\n- nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).\n- nfc: st21nfca: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).\n- nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling (git-fixes).\n- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).\n- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).\n- nfp: flower: fix ida_idx not being released (git-fixes).\n- NFS: Avoid duplicate uncached readdir calls on eof (git-fixes).\n- NFSD: allow delegation state ids to be revoked and then freed (bsc#1192483).\n- NFSD: allow lock state ids to be revoked and then freed (bsc#1192483).\n- NFSD: allow open state ids to be revoked and then freed (bsc#1192483).\n- nfsd: destroy percpu stats counters after reply cache shutdown (git-fixes).\n- NFSD: do not admin-revoke NSv4.0 state ids (bsc#1192483).\n- NFSD: Fix a write performance regression (bsc#1197016).\n- NFSD: fix crash on COPY_NOTIFY with special stateid (git-fixes).\n- NFSD: Fix nsfd startup race (again) (git-fixes).\n- nfsd: Fix null-ptr-deref in nfsd_fill_super() (git-fixes).\n- NFSD: Fix READDIR buffer overflow (git-fixes).\n- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).\n- NFSD: Fix verifier returned in stable WRITEs (git-fixes).\n- NFSD: Fix zero-length NFSv3 WRITEs (git-fixes).\n- NFSD: more robust allocation failure handling in nfsd_file_cache_init (git-fixes).\n- NFSD: nfsd4_setclientid_confirm mistakenly expires confirmed client (git-fixes).\n- NFS: Do not loop forever in nfs_do_recoalesce() (git-fixes).\n- NFS: Do not overfill uncached readdir pages (git-fixes).\n- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).\n- NFS: Do not report ENOSPC write errors twice (git-fixes).\n- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).\n- NFS: Do not report flush errors in nfs_write_end() (git-fixes).\n- NFS: Do not report writeback errors in nfs_getattr() (git-fixes).\n- NFS: Do not skip directory entries when doing uncached readdir (git-fixes).\n- NFS: do not store \u0027struct cred *\u0027 in struct nfs_access_entry (git-fixes).\n- NFSD: prepare for supporting admin-revocation of state (bsc#1192483).\n- NFSD: Replace use of rwsem with errseq_t (bsc#1196960).\n- NFS: Ensure the server had an up to date ctime before hardlinking (git-fixes).\n- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).\n- NFS: fix broken handling of the softreval mount option (git-fixes).\n- NFS: Fix initialisation of nfs_client cl_flags field (git-fixes).\n- NFS: fsync() should report filesystem errors over EINTR/ERESTARTSYS (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- NFS: limit use of ACCESS cache for negative responses (bsc#1196570).\n- NFS: Memory allocation failures are not server fatal errors (git-fixes).\n- NFS: NFSv2/v3 clients should never be setting NFS_CAP_XATTR (git-fixes).\n- NFS: pass cred explicitly for access tests (git-fixes).\n- NFS: Remove an incorrect revalidation in nfs4_update_changeattr_locked() (git-fixes).\n- NFS: Return valid errors from nfs2/3_decode_dirent() (git-fixes).\n- NFS: Use of mapping_set_error() results in spurious errors (git-fixes).\n- NFSv4.1: do not retry BIND_CONN_TO_SESSION on session error (git-fixes).\n- NFSv4.1 mark qualified async operations as MOVEABLE tasks (git-fixes).\n- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).\n- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).\n- NFSv4: Do not invalidate inode attributes on delegation return (git-fixes).\n- NFSv4: Fix another issue with a list iterator pointing to the head (git-fixes).\n- NFSv4: fix open failure with O_ACCMODE flag (git-fixes).\n- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).\n- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).\n- nl80211: correctly check NL80211_ATTR_REG_ALPHA2 size (git-fixes).\n- nl80211: fix locking in nl80211_set_tx_bitrate_mask() (git-fixes).\n- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).\n- nl80211: show SSID for P2P_GO interfaces (git-fixes).\n- nl80211: Update bss channel on channel switch for P2P_CLIENT (git-fixes).\n- nl80211: validate S1G channel width (git-fixes).\n- ntb_hw_switchtec: Fix bug with more than 32 partitions (git-fixes).\n- ntb_hw_switchtec: Fix pff ioread to read into mmio_part_cfg_all (git-fixes).\n- ntb: intel: fix port config status offset for SPR (git-fixes).\n- n_tty: wake up poll(POLLRDNORM) on receiving data (git-fixes).\n- nvme: add verbose error logging (bsc#1200567). Update config files.\n- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).\n- nvme: do not return an error from nvme_configure_metadata (git-fixes).\n- nvme: expose cntrltype and dctype through sysfs (jsc#SLE-23643).\n- nvme: fix a possible use-after-free in controller reset during load (git-fixes).\n- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).\n- nvme: send uevent on connection up (jsc#SLE-23643).\n- objtool: Add frame-pointer-specific function ignore (bsc#1193277).\n- objtool: Fix code relocs vs weak symbols (git-fixes).\n- objtool: Fix type of reloc::addend (git-fixes).\n- objtool: Ignore unwind hints for ignored functions (bsc#1193277).\n- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).\n- of: base: Fix phandle argument length mismatch error message (git-fixes).\n- of: base: Improve argument length mismatch error (git-fixes).\n- of/fdt: Do not worry about non-memory region overlap for no-map (git-fixes).\n- of: overlay: do not break notify on NOTIFY_{OK|STOP} (git-fixes).\n- of: Support more than one crash kernel regions for kexec -s (git-fixes).\n- of: unittest: 64 bit dma address test requires arch support (git-fixes).\n- of: unittest: fix warning on PowerPC frame size warning (git-fixes).\n- of: unittest: update text of expected warnings (git-fixes).\n- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config\n- PCI: aardvark: Add support for DEVCAP2, DEVCTL2, LNKCAP2 and LNKCTL2 registers on emulated bridge (git-fixes).\n- PCI: aardvark: Add support for ERR interrupt on emulated bridge (git-fixes).\n- PCI: aardvark: Add support for masking MSI interrupts (git-fixes).\n- PCI: aardvark: Add support for PME interrupts (git-fixes).\n- PCI: aardvark: Assert PERST# when unbinding driver (git-fixes).\n- PCI: aardvark: Clear all MSIs at setup (git-fixes).\n- PCI: aardvark: Comment actions in driver remove method (git-fixes).\n- PCI: aardvark: Disable bus mastering when unbinding driver (git-fixes).\n- PCI: aardvark: Disable common PHY when unbinding driver (git-fixes).\n- PCI: aardvark: Disable link training when unbinding driver (git-fixes).\n- PCI: aardvark: Do not mask irq when mapping (git-fixes).\n- PCI: aardvark: Drop __maybe_unused from advk_pcie_disable_phy() (git-fixes).\n- PCI: aardvark: Enable MSI-X support (git-fixes).\n- PCI: aardvark: Fix memory leak in driver unbind (git-fixes).\n- PCI: aardvark: Fix reading MSI interrupt number (git-fixes).\n- PCI: aardvark: Fix reading PCI_EXP_RTSTA_PME bit on emulated bridge (git-fixes).\n- PCI: aardvark: Fix setting MSI address (git-fixes).\n- PCI: aardvark: Fix support for MSI interrupts (git-fixes).\n- PCI: aardvark: Fix support for PME requester on emulated bridge (git-fixes).\n- PCI: aardvark: Make msi_domain_info structure a static driver structure (git-fixes).\n- PCI: aardvark: Make MSI irq_chip structures static driver structures (git-fixes).\n- PCI: aardvark: Mask all interrupts when unbinding driver (git-fixes).\n- PCI: aardvark: Optimize writing PCI_EXP_RTCTL_PMEIE and PCI_EXP_RTSTA_PME on emulated bridge (git-fixes).\n- PCI: aardvark: Refactor unmasking summary MSI interrupt (git-fixes).\n- PCI: aardvark: Remove irq_mask_ack() callback for INTx interrupts (git-fixes).\n- PCI: aardvark: Replace custom PCIE_CORE_INT_* macros with PCI_INTERRUPT_* (git-fixes).\n- PCI: aardvark: Rewrite IRQ code to chained IRQ handler (git-fixes).\n- PCI: aardvark: Update comment about link going down after link-up (git-fixes).\n- PCI: aardvark: Use dev_fwnode() instead of of_node_to_fwnode(dev-\u003eof_node) (git-fixes).\n- PCI: aardvark: Use separate INTA interrupt for emulated root bridge (git-fixes).\n- PCI/ACPI: Allow D3 only if Root Port can signal and wake from D3 (git-fixes).\n- PCI: Add ACS quirk for Pericom PI7C9X2G switches (bsc#1199390).\n- PCI/AER: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes).\n- PCI: Avoid broken MSI on SB600 USB devices (git-fixes).\n- PCI: cadence: Fix find_first_zero_bit() limit (git-fixes).\n- PCI: dwc: Fix setting error return on MSI DMA mapping failure (git-fixes).\n- PCI: endpoint: Fix alignment fault error in copy tests (git-fixes).\n- PCI: endpoint: Fix misused goto label (git-fixes).\n- PCI: fu740: Force 2.5GT/s for initial device probe (git-fixes).\n- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).\n- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology (git-fixes).\n- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- PCI: imx6: Allow to probe when dw_pcie_wait_for_link() fails (git-fixes).\n- PCI: imx6: Fix PERST# start-up sequence (git-fixes).\n- PCI: Mark all AMD Navi10 and Navi14 GPU ATS as broken (git-fixes).\n- PCI: microchip: Fix potential race in interrupt handling (git-fixes).\n- PCI: mvebu: Fix configuring secondary bus of PCIe Root Port via emulated bridge (git-fixes).\n- PCI: mvebu: Fix device enumeration regression (git-fixes).\n- PCI: mvebu: Fix support for bus mastering and PCI_COMMAND on emulated bridge (git-fixes).\n- PCI: mvebu: Fix support for PCI_BRIDGE_CTL_BUS_RESET on emulated bridge (git-fixes).\n- PCI: mvebu: Setup PCIe controller to Root Complex mode (git-fixes).\n- PCI: pci-bridge-emul: Add definitions for missing capabilities registers (git-fixes).\n- PCI: pci-bridge-emul: Add description for class_revision field (git-fixes).\n- PCI: pciehp: Add Qualcomm quirk for Command Completed erratum (git-fixes).\n- PCI: pciehp: Clear cmd_busy bit in polling mode (git-fixes).\n- PCI/PM: Power up all devices during runtime resume (git-fixes).\n- PCI: qcom: Fix runtime PM imbalance on probe errors (git-fixes).\n- PCI: qcom: Fix unbalanced PHY init on probe errors (git-fixes).\n- PCI: rockchip: Fix find_first_zero_bit() limit (git-fixes).\n- PCI/switchtec: Add Gen4 automotive device IDs (git-fixes).\n- PCI: Work around Intel I210 ROM BAR overlap defect (git-fixes).\n- pcmcia: db1xxx_ss: restrict to MIPS_DB1XXX boards (git-fixes).\n- perf: Copy perf_event_attr::sig_data on modification (git fixes).\n- perf/core: Do not pass task around when ctx sched in (git-fixes).\n- perf/core: Fix address filter parser for multiple filters (git fixes).\n- perf/core: Fix cgroup event list management (git fixes).\n- perf/core: Fix perf_cgroup_switch() (git fixes).\n- perf/core: Fix perf_mmap fail when CONFIG_PERF_USE_VMALLOC enabled (git fixes).\n- perf: Fix list corruption in perf_cgroup_switch() (git fixes).\n- perf/x86/intel/pt: Fix address filter config for 32-bit kernel (git fixes).\n- perf/x86/intel/pt: Fix crash with stop filters in single-range mode (git fixes).\n- perf/x86/intel/uncore: Make uncore_discovery clean for 64 bit addresses (bsc#1197304).\n- perf/x86/intel: Update the FRONTEND MSR mask on Sapphire Rapids (git fixes).\n- phy: amlogic: fix error path in phy_g12a_usb3_pcie_probe() (git-fixes).\n- phy: amlogic: meson8b-usb2: fix shared reset control use (git-fixes).\n- phy: amlogic: meson8b-usb2: Use dev_err_probe() (git-fixes).\n- phy: amlogic: phy-meson-gxl-usb2: fix shared reset controller use (git-fixes).\n- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).\n- phy: broadcom: Kconfig: Fix PHY_BRCM_USB config option (git-fixes).\n- phy: dphy: Correct clk_pre parameter (git-fixes).\n- phy: dphy: Correct lpx parameter and its derivatives(ta_{get,go,sure}) (git-fixes).\n- phy: mapphone-mdm6600: Fix PM error handling in phy_mdm6600_probe (git-fixes).\n- phy: phy-brcm-usb: fixup BCM4908 support (git-fixes).\n- phy: qcom-qmp: fix pipe-clock imbalance on power-on failure (git-fixes).\n- phy: qcom-qmp: fix reset-controller leak on probe errors (git-fixes).\n- phy: qcom-qmp: fix struct clk leak on probe errors (git-fixes).\n- phy: samsung: exynos5250-sata: fix missing device put in probe error paths (git-fixes).\n- phy: samsung: Fix missing of_node_put() in exynos_sata_phy_probe (git-fixes).\n- phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() (git-fixes).\n- phy: ti: Add missing pm_runtime_disable() in serdes_am654_probe (git-fixes).\n- phy: ti: Fix missing sentinel for clk_div_table (git-fixes).\n- phy: ti: omap-usb2: Fix error handling in omap_usb2_enable_clocks (git-fixes).\n- phy: usb: Leave some clocks running during suspend (git-fixes).\n- phy: xilinx: zynqmp: Fix bus width setting for SGMII (git-fixes).\n- pinctrl: bcm2835: Fix a few error paths (git-fixes).\n- pinctrl: bcm63xx: fix unmet dependency on REGMAP for GPIO_REGMAP (git-fixes).\n- pinctrl: fix loop in k210_pinconf_get_drive() (git-fixes).\n- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).\n- pinctrl: intel: fix unexpected interrupt (git-fixes).\n- pinctrl: k210: Fix bias-pull-up (git-fixes).\n- pinctrl: mediatek: Fix missing of_node_put() in mtk_pctrl_init (git-fixes).\n- pinctrl: mediatek: moore: Fix build error (git-fixes).\n- pinctrl: mediatek: mt8195: enable driver on mtk platforms (git-fixes).\n- pinctrl: mediatek: mt8365: fix IES control pins (git-fixes).\n- pinctrl: mediatek: paris: Fix \u0027argument\u0027 argument type for mtk_pinconf_get() (git-fixes).\n- pinctrl: mediatek: paris: Fix PIN_CONFIG_BIAS_* readback (git-fixes).\n- pinctrl: mediatek: paris: Fix pingroup pin config state readback (git-fixes).\n- pinctrl: mediatek: paris: Skip custom extra pin config dump for virtual GPIOs (git-fixes).\n- pinctrl: microchip-sgpio: lock RMW access (git-fixes).\n- pinctrl: microchip sgpio: use reset driver (git-fixes).\n- pinctrl: mvebu: Fix irq_of_parse_and_map() return value (git-fixes).\n- pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe (git-fixes).\n- pinctrl: npcm: Fix broken references to chip-\u003eparent_device (git-fixes).\n- pinctrl: nuvoton: npcm7xx: Rename DS() macro to DSTR() (git-fixes).\n- pinctrl: nuvoton: npcm7xx: Use %zu printk format for ARRAY_SIZE() (git-fixes).\n- pinctrl: pinconf-generic: Print arguments for bias-pull-* (git-fixes).\n- pinctrl: pinctrl-aspeed-g6: remove FWQSPID group in pinctrl (git-fixes).\n- pinctrl: pistachio: fix use of irq_of_parse_and_map() (git-fixes).\n- pinctrl: renesas: checker: Fix miscalculation of number of states (git-fixes).\n- pinctrl: renesas: core: Fix possible null-ptr-deref in sh_pfc_map_resources() (git-fixes).\n- pinctrl: renesas: r8a77470: Reduce size for narrow VIN1 channel (git-fixes).\n- pinctrl: renesas: r8a779a0: Fix GPIO function on I2C-capable pins (git-fixes).\n- pinctrl: renesas: rzn1: Fix possible null-ptr-deref in sh_pfc_map_resources() (git-fixes).\n- pinctrl/rockchip: Add missing of_node_put() in rockchip_pinctrl_probe (git-fixes).\n- pinctrl: rockchip: fix RK3308 pinmux bits (git-fixes).\n- pinctrl: samsung: drop pin banks references on error paths (git-fixes).\n- pinctrl: samsung: fix missing GPIOLIB on ARM64 Exynos config (git-fixes).\n- pinctrl: stm32: Do not call stm32_gpio_get() for edge triggered IRQs in EOI (git-fixes).\n- pinctrl: stm32: Keep pinctrl block clock enabled when LEVEL IRQ requested (git-fixes).\n- pinctrl: sunxi: fix f1c100s uart2 function (git-fixes).\n- pinctrl: sunxi: Fix H616 I2S3 pin data (git-fixes).\n- pinctrl: sunxi: Use unique lockdep classes for IRQs (git-fixes).\n- pinctrl: tegra: tegra194: drop unused pin groups (git-fixes).\n- pinctrl: tigerlake: Revert \u0027Add Alder Lake-M ACPI ID\u0027 (git-fixes).\n- ping: fix the sk_bound_dev_if match in ping_lookup (bsc#1195826).\n- ping: remove pr_err from ping_lookup (bsc#1195826).\n- pipe: Fix missing lock in pipe_resize_ring() (git-fixes).\n- platform/chrome: cros_ec_debugfs: detach log reader wq from devm (git-fixes).\n- platform/chrome: cros_ec: fix error handling in cros_ec_register() (git-fixes).\n- platform/chrome: cros_ec_typec: Check for EC device (git-fixes).\n- platform/chrome: Re-introduce cros_ec_cmd_xfer and use it for ioctls (git-fixes).\n- platform: finally disallow IRQ0 in platform_get_irq() and its ilk (git-fixes).\n- platform/surface: aggregator: Fix initialization order when compiling as builtin module (git-fixes).\n- platform/surface: surface3-wmi: Simplify resource management (git-fixes).\n- platform/x86: Add Intel Software Defined Silicon driver (jsc#SLE-18938).\n- platform/x86: asus-wmi: Add support for custom fan curves (bsc#1198058).\n- platform/x86: asus-wmi: Delete impossible condition (bsc#1198058).\n- platform/x86: asus-wmi: Fix driver not binding when fan curve control probe fails (git-fixes).\n- platform/x86: asus-wmi: Fix regression when probing for fan curve control (bsc#1198058).\n- platform/x86: asus-wmi: Fix \u0027unsigned \u0027retval\u0027 is never less than zero\u0027 smatch warning (bsc#1198058).\n- platform/x86: asus-wmi: Potential buffer overflow in asus_wmi_evaluate_method_buf() (git-fixes).\n- platform/x86: gigabyte-wmi: Add support for B450M DS3H-CF (git-fixes).\n- platform/x86: gigabyte-wmi: Add Z690M AORUS ELITE AX DDR4 support (git-fixes).\n- platform/x86: huawei-wmi: check the return value of device_create_file() (git-fixes).\n- platform/x86: intel-hid: fix _DSM function index handling (git-fixes).\n- platform/x86/intel/sdsi: Fix bug in multi packet reads (jsc#SLE-18901).\n- platform/x86/intel/sdsi: Handle leaky bucket (jsc#SLE-18901).\n- platform/x86/intel/sdsi: Poll on ready bit for writes (jsc#SLE-18901).\n- platform/x86: panasonic-laptop: de-obfuscate button codes (git-fixes).\n- platform/x86: panasonic-laptop: do not report duplicate brightness key-presses (git-fixes).\n- platform/x86: panasonic-laptop: filter out duplicate volume up/down/mute keypresses (git-fixes).\n- platform/x86: panasonic-laptop: revert \u0027Resolve hotkey double trigger bug\u0027 (git-fixes).\n- platform/x86: panasonic-laptop: sort includes alphabetically (git-fixes).\n- platform/x86: samsung-laptop: Fix an unsigned comparison which can never be negative (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the RWC NANOTE P8 AY07J 2-in-1 (git-fixes).\n- PM: core: keep irq flags in device_pm_check_callbacks() (git-fixes).\n- PM / devfreq: exynos-ppmu: Fix refcount leak in of_get_devfreq_events (git-fixes).\n- PM / devfreq: rk3399_dmc: Disable edev on remove() (git-fixes).\n- PM: domains: Fix initialization of genpd\u0027s next_wakeup (git-fixes).\n- PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove() (git-fixes).\n- PM: hibernate: fix __setup handler error handling (git-fixes).\n- PM: hibernate: Remove register_nosave_region_late() (git-fixes).\n- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).\n- PM: suspend: fix return value of __setup handler (git-fixes).\n- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).\n- pNFS: Avoid a live lock condition in pnfs_update_layout() (git-fixes).\n- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).\n- powerpc/64: Move paca allocation later in boot (bsc#1190812).\n- powerpc/64s: Add CPU_FTRS_POWER10 to ALWAYS mask (jsc#SLE-13521 git-fixes).\n- powerpc/64s: Add CPU_FTRS_POWER9_DD2_2 to CPU_FTRS_ALWAYS mask (bsc#1061840 git-fixes).\n- powerpc/64s: Do not use DSISR for SLB faults (bsc#1194869).\n- powerpc/64s/radix: Fix huge vmap false positive (bsc#1156395).\n- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- powerpc/bpf: Update ldimm64 instructions during extra pass (bsc#1194869).\n- powerpc: Do not select HAVE_IRQ_EXIT_ON_IRQ_STACK (bsc#1194869).\n- powerpc: Enable the DAWR on POWER9 DD2.3 and above (bsc#1055117 ltc#159753).\n- powerpc/fadump: fix PT_LOAD segment for boot memory area (bsc#1103269 ltc#169948 git-fixes).\n- powerpc/fadump: opt out from freeing pages on cma activation failure (bsc#1195099 ltc#196102).\n- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/lib/sstep: Fix \u0027sthcx\u0027 instruction (bsc#1156395).\n- powerpc/mce: Modify the real address error logging messages (jsc#SLE-18194).\n- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).\n- powerpc/perf: Do not use perf_hw_context for trace IMC PMU (bsc#1156395).\n- powerpc/perf: Fix power10 event alternatives (jsc#SLE-13513 git-fixes).\n- powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes).\n- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).\n- powerpc/perf: Fix the threshold compare group constraint for power10 (bsc#1194869).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- powerpc/powernv: Add __init attribute to eligible functions (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Get L1D flush requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Get STF barrier requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Remove POWER9 PVR version check for entry and uaccess flushes (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).\n- powerpc/pseries: Parse control memory access error (jsc#SLE-18194).\n- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).\n- powerpc/sysdev: fix incorrect use to determine if list is empty (bsc#1065729).\n- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).\n- powerpc/vdso: Fix incorrect CFI in gettimeofday.S (bsc#1199173 ltc#197388).\n- powerpc/vdso: Remove cvdso_call_time macro (bsc#1199173 ltc#197388).\n- powerpc/xive: Add a debugfs file to dump EQs (bsc#1194409 ltc#195810).\n- powerpc/xive: Add some error handling code to \u0027xive_spapr_init()\u0027 (git-fixes).\n- powerpc/xive: Change the debugfs file \u0027xive\u0027 into a directory (bsc#1194409 ltc#195810).\n- powerpc/xive: Export XIVE IPI information for online-only processors (bsc#1194409 ltc#195810).\n- powerpc/xive: Fix refcount leak in xive_spapr_init (git-fixes).\n- powerpc/xive: fix return value of __setup handler (bsc#1065729).\n- powerpc/xive: Introduce an helper to print out interrupt characteristics (bsc#1194409 ltc#195810).\n- powerpc/xive: Introduce xive_core_debugfs_create() (bsc#1194409 ltc#195810).\n- powerpc/xive: Rename the \u0027cpus\u0027 debugfs file to \u0027ipis\u0027 (bsc#1194409 ltc#195810).\n- power: reset: gemini-poweroff: Fix IRQ check in gemini_poweroff_probe (git-fixes).\n- power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init (git-fixes).\n- power: supply: axp20x_battery: properly report current when discharging (git-fixes).\n- power: supply: axp288-charger: Set Vhold to 4.4V (git-fixes).\n- power: supply: axp288_fuel_gauge: Drop BIOS version check from \u0027T3 MRD\u0027 DMI quirk (git-fixes).\n- power: supply: axp288_fuel_gauge: Fix battery reporting on the One Mix 1 (git-fixes).\n- power: supply: bq24190_charger: Fix bq24190_vbus_is_enabled() wrong false return (git-fixes).\n- power: supply: sbs-charger: Do not cancel work that is not initialized (git-fixes).\n- power: supply: wm8350-power: Add missing free in free_charger_irq (git-fixes).\n- power: supply: wm8350-power: Handle error for wm8350_register_irq (git-fixes).\n- pps: clients: gpio: Propagate return value from pps_gpio_probe (git-fixes).\n- printk: Add panic_in_progress helper (bsc#1197894).\n- printk: disable optimistic spin during panic (bsc#1197894).\n- proc: bootconfig: Add null pointer check (git-fixes).\n- proc: fix documentation and description of pagemap (git-fixes).\n- procfs: prevent unprivileged processes accessing fdinfo dir (git-fixes).\n- psi: fix \u0027defined but not used\u0027 warnings when (git-fixes)\n- ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc#1198413).\n- pvpanic: Fix typos in the comments (git-fixes).\n- pwm: lp3943: Fix duty calculation in case period was clamped (git-fixes).\n- pwm: lpc18xx-sct: Initialize driver data and hardware before pwmchip_add() (git-fixes).\n- pwm: raspberrypi-poe: Fix endianness in firmware struct (git-fixes).\n- qed: display VF trust config (git-fixes).\n- qede: confirm skb is allocated before using (git-fixes).\n- qed: fix ethtool register dump (jsc#SLE-19001).\n- qed: return status of qed_iov_get_link (git-fixes).\n- qla2xxx: add -\u003emap_queues support for nvme (bsc#1195823).\n- qlcnic: dcb: default to returning -EOPNOTSUPP (git-fixes).\n- raid5: introduce MD_BROKEN (git-fixes).\n- random: check for signal_pending() outside of need_resched() check (git-fixes).\n- random: wake up /dev/random writers after zap (git-fixes).\n- random: wire up fops-\u003esplice_{read,write}_iter() (git-fixes).\n- ray_cs: Check ioremap return value (git-fixes).\n- RDMA/cma: Do not change route.addr.src_addr outside state checks (git-fixes).\n- RDMA/cma: Use correct address when leaving multicast group (git-fixes).\n- RDMA/core: Fix ib_qp_usecnt_dec() called when error (jsc#SLE-19249).\n- RDMA/core: Set MR type in ib_reg_user_mr (git-fixes).\n- RDMA/hfi1: Fix use-after-free bug for mm struct (git-fixes).\n- RDMA/ib_srp: Fix a deadlock (git-fixes).\n- RDMA/irdma: Fix netdev notifications for vlan\u0027s (git-fixes).\n- RDMA/irdma: Fix Passthrough mode in VM (git-fixes).\n- RDMA/irdma: Fix possible crash due to NULL netdev in notifier (git-fixes).\n- RDMA/irdma: Flush iWARP QP if modified to ERR from RTR state (git-fixes).\n- RDMA/irdma: Prevent some integer underflows (git-fixes).\n- RDMA/irdma: Reduce iWARP QP destroy time (git-fixes).\n- RDMA/irdma: Remove incorrect masking of PD (git-fixes).\n- RDMA/irdma: Set protocol based on PF rdma_mode flag (bsc#1200502).\n- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).\n- RDMA/mlx5: Add a missing update of cache-\u003elast_add (git-fixes).\n- RDMA/mlx5: Do not remove cache MRs when a delay is needed (git-fixes).\n- RDMA/mlx5: Fix memory leak in error flow for subscribe event routine (git-fixes).\n- RDMA/mlx5: Fix the flow of a miss in the allocation of a cache ODP MR (git-fixes).\n- RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit() (jsc#SLE-19249).\n- RDMA/rtrs-clt: Fix possible double free in error case (git-fixes).\n- RDMA/rtrs-clt: Move free_permit from free_clt to rtrs_clt_close (git-fixes).\n- RDMA/rxe: Change variable and function argument to proper type (jsc#SLE-19249).\n- RDMA/rxe: Check the last packet by RXE_END_MASK (git-fixes).\n- RDMA/rxe: Fix ref error in rxe_av.c (jsc#SLE-19249).\n- RDMA/siw: Fix a condition race issue in MPA request processing (git-fixes).\n- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).\n- RDMA/siw: Fix refcounting leak in siw_create_qp() (jsc#SLE-19249).\n- RDMA/ucma: Protect mc during concurrent multicast leaves (git-fixes).\n- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).\n- regmap-irq: Fix offset/index mismatch in read_sub_irq_data() (git-fixes).\n- regmap-irq: Update interrupt clear register for proper reset (git-fixes).\n- regulator: atc260x: Fix missing active_discharge_on setting (git-fixes).\n- regulator: core: Fix enable_count imbalance with EXCLUSIVE_GET (git-fixes).\n- regulator: core: fix false positive in regulator_late_cleanup() (git-fixes).\n- regulator: da9121: Fix uninit-value in da9121_assign_chip_model() (git-fixes).\n- regulator: mt6315: Enforce regulator-compatible, not name (git-fixes).\n- regulator: mt6315-regulator: fix invalid allowed mode (git-fixes).\n- regulator: pfuze100: Fix refcount leak in pfuze_parse_regulators_dt (git-fixes).\n- regulator: qcom_smd: fix for_each_child.cocci warnings (git-fixes).\n- regulator: qcom_smd: Fix up PM8950 regulator configuration (git-fixes).\n- regulator: rpi-panel: Handle I2C errors/timing to the Atmel (git-fixes).\n- regulator: scmi: Fix refcount leak in scmi_regulator_probe (git-fixes).\n- regulator: wm8994: Add an off-on delay for WM8994 variant (git-fixes).\n- remoteproc: Fix count check in rproc_coredump_write() (git-fixes).\n- remoteproc: imx_rproc: Ignore create mem entry for resource table (git-fixes).\n- remoteproc: qcom: Fix missing of_node_put in adsp_alloc_memory_region (git-fixes).\n- remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region (git-fixes).\n- remoteproc: qcom_wcnss: Add missing of_node_put() in wcnss_alloc_memory_region (git-fixes).\n- reset: tegra-bpmp: Restore Handle errors in BPMP response (git-fixes).\n- Revert \u0027drm/amd/display: Fix DCN3 B0 DP Alt Mapping\u0027 (git-fixes).\n- Revert \u0027svm: Add warning message for AVIC IPI invalid target\u0027 (git-fixes).\n- rfkill: make new event layout opt-in (git-fixes).\n- rfkill: uapi: fix RFKILL_IOCTL_MAX_SIZE ioctl request definition (git-fixes).\n- riscv: Fix fill_callchain return value (git fixes).\n- rpmsg: qcom_smd: Fix irq_of_parse_and_map() return value (git-fixes).\n- rpmsg: qcom_smd: Fix redundant channel-\u003eregistered assignment (git-fixes).\n- rpmsg: qcom_smd: Fix returning 0 if irq_of_parse_and_map() fails (git-fixes).\n- rpmsg: virtio: Fix possible double free in rpmsg_probe() (git-fixes).\n- rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev() (git-fixes).\n- rpmsg: virtio: Fix the unregistration of the device rpmsg_ctrl (git-fixes).\n- rtc: check if __rtc_read_time was successful (git-fixes).\n- rtc: fix use-after-free on device removal (git-fixes).\n- rtc: ftrtc010: Fix error handling in ftrtc010_rtc_probe (git-fixes).\n- rtc: ftrtc010: Use platform_get_irq() to get the interrupt (git-fixes).\n- rtc: mc146818-lib: fix locking in mc146818_set_time (git-fixes).\n- rtc: mc146818-lib: Fix the AltCentury for AMD platforms (git-fixes).\n- rtc: mt6397: check return value after calling platform_get_resource() (git-fixes).\n- rtc: mxc: Silence a clang warning (git-fixes).\n- rtc: pcf2127: fix bug when reading alarm registers (git-fixes).\n- rtc: pl031: fix rtc features null pointer dereference (git-fixes).\n- rtc: sun6i: Fix time overflow handling (git-fixes).\n- rtc: wm8350: Handle error for wm8350_register_irq (git-fixes).\n- rtl818x: Prevent using not initialized queues (git-fixes).\n- rtlwifi: Use pr_warn instead of WARN_ONCE (git-fixes).\n- rtw88: 8821c: fix debugfs rssi value (git-fixes).\n- rtw88: 8821c: support RFE type4 wifi NIC (git-fixes).\n- rtw88: Disable PCIe ASPM while doing NAPI poll on 8821CE (git-fixes).\n- rtw88: rtw8821c: enable rfe 6 devices (git-fixes).\n- s390/crypto: fix scatterwalk_unmap() callers in AES-GCM (git-fixes).\n- s390/ctcm: fix potential memory leak (git-fixes).\n- s390/ctcm: fix variable dereferenced before check (git-fixes).\n- s390-dasd-fix-data-corruption-for-ESE-devices (bsc#1200205 LTC#198456).\n- s390/dasd: fix data corruption for ESE devices (git-fixes).\n- s390-dasd-Fix-read-for-ESE-with-blksize-4k (bsc#1200211 LTC#198457).\n- s390/dasd: Fix read for ESE with blksize 4k (git-fixes).\n- s390-dasd-Fix-read-inconsistency-for-ESE-DASD-devices (bsc#1200211 LTC#198457).\n- s390/dasd: Fix read inconsistency for ESE DASD devices (git-fixes).\n- s390-dasd-prevent-double-format-of-tracks-for-ESE-devices (bsc#1200205 LTC#198456).\n- s390/dasd: prevent double format of tracks for ESE devices (git-fixes).\n- s390/entry: fix duplicate tracking of irq nesting level (git-fixes).\n- s390/extable: fix exception table sorting (git-fixes).\n- s390/kexec_file: fix error handling when applying relocations (git-fixes).\n- s390/kexec: fix memory leak of ipl report buffer (git-fixes).\n- s390/kexec: fix return code handling (git-fixes).\n- s390/lcs: fix variable dereferenced before check (git-fixes).\n- s390/mcck: isolate SIE instruction when setting CIF_MCCK_GUEST flag (git-fixes).\n- s390/module: fix loading modules with a lot of relocations (git-fixes).\n- s390/nmi: handle guarded storage validity failures for KVM guests (git-fixes).\n- s390/nmi: handle vector validity failures for KVM guests (git-fixes).\n- s390/perf: obtain sie_block from the right address (bsc#1200315 LTC#198473).\n- s390/setup: avoid reserving memory above identity mapping (git-fixes).\n- s390/smp: sort out physical vs virtual pointers usage (git-fixes).\n- sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl (git-fixes).\n- sata_fsl: fix warning in remove_proc_entry when rmmod sata_fsl (git-fixes).\n- sc16is7xx: Fix for incorrect data being transmitted (git-fixes).\n- sched/core: Export pelt_thermal_tp (git-fixes)\n- sched/core: Fix forceidle balancing (git-fixes)\n- sched/core: Mitigate race (git-fixes)\n- sched/cpuacct: Fix charge percpu cpuusage (git-fixes)\n- sched/cpuacct: Fix user/system in shown cpuacct.usage* (git-fixes)\n- sched/debug: Remove mpol_get/put and task_lock/unlock from (git-fixes)\n- sched: Define and initialize a flag to identify valid PASID in the task (jsc#SLE-24350).\n- sched/fair: Consider CPU affinity when allowing NUMA imbalance in find_idlest_group() (bnc#1193431).\n- sched/fair: Fix fault in reweight_entity (git fixes (sched/core)).\n- sched/fair: Revise comment about lb decision matrix (git-fixes)\n- sched: Fix balance_push() vs __sched_setscheduler() (git-fixes)\n- sched: Fix yet more sched_fork() races (git fixes (sched/core)).\n- sched/membarrier: Fix membarrier-rseq fence command missing (git-fixes)\n- sched/numa: Adjust imb_numa_nr to a better approximation of memory channels (bnc#1193431).\n- sched/numa: Apply imbalance limitations consistently (bnc#1193431).\n- sched/numa: Do not swap tasks between nodes when spare capacity is available (bnc#1193431).\n- sched/numa: Initialise numa_migrate_retry (bnc#1193431).\n- sched/pasid: Add a kABI workaround (jsc#SLE-24350).\n- sched/pelt: Fix attach_entity_load_avg() corner case (git-fixes)\n- sched/pelt: Relax the sync of util_sum with util_avg (git-fixes)\n- sched/psi: report zeroes for CPU full at the system level (git-fixes)\n- sched/rt: Plug rt_mutex_setprio() vs push_rt_task() race (git-fixes)\n- sched/rt: Try to restart rt period timer when rt runtime (git-fixes)\n- sched/scs: Reset task stack state in bringup_cpu() (git-fixes)\n- sched/sugov: Ignore busy filter when rq is capped by (git-fixes)\n- sched: Teach the forced-newidle balancer about CPU affinity (git-fixes)\n- scripts/faddr2line: Fix overlapping text section failures (git-fixes).\n- scsi: block: pm: Always set request queue runtime active in blk_post_runtime_resume() (bsc#1198802).\n- scsi: block: PM fix blk_post_runtime_resume() args (bsc#1198802).\n- scsi: core: Query VPD size before getting full page (git-fixes).\n- scsi: dc395x: Fix a missing check on list iterator (git-fixes).\n- scsi: elx: efct: Do not use GFP_KERNEL under spin lock (git-fixes).\n- scsi: fnic: Fix a tracing statement (git-fixes).\n- scsi: fnic: Replace DMA mask of 64 bits with 47 bits (bsc#1199631).\n- scsi: hisi_sas: Add more logs for runtime suspend/resume (bsc#1198802).\n- scsi: hisi_sas: Change permission of parameter prot_mask (git-fixes).\n- scsi: hisi_sas: Fix rescan after deleting a disk (git-fixes).\n- scsi: hisi_sas: Fix some issues related to asd_sas_port-phy_list (bsc#1198802).\n- scsi: hisi_sas: Increase debugfs_dump_index after dump is completed (bsc#1198806).\n- scsi: hisi_sas: Initialise devices in .slave_alloc callback (bsc#1198802).\n- scsi: hisi_sas: Limit users changing debugfs BIST count value (bsc#1198803).\n- scsi: hisi_sas: Remove unused variable and check in hisi_sas_send_ata_reset_each_phy() (git-fixes).\n- scsi: hisi_sas: Wait for phyup in hisi_sas_control_phy() (bsc#1198802).\n- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: libsas: Add flag SAS_HA_RESUMING (bsc#1198802).\n- scsi: libsas: Add spin_lock/unlock() to protect asd_sas_port-\u003ephy_list (bsc#1198802).\n- scsi: libsas: Defer works of new phys during suspend (bsc#1198802).\n- scsi: libsas: Do not always drain event workqueue for HA resume (bsc#1198802).\n- scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes).\n- scsi: libsas: Insert PORTE_BROADCAST_RCVD event for resuming host (bsc#1198802).\n- scsi: libsas: Keep host active while processing events (bsc#1198802).\n- scsi: libsas: Refactor sas_queue_deferred_work() (bsc#1198802).\n- scsi: libsas: Resume host while sending SMP I/Os (bsc#1198802).\n- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).\n- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).\n- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).\n- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).\n- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).\n- scsi: lpfc: Alter FPIN stat accounting logic (bsc#1200045).\n- scsi: lpfc: Change FA-PWWN detection methodology (bsc#1200045).\n- scsi: lpfc: Change VMID registration to be based on fabric parameters (bsc#1200045).\n- scsi: lpfc: Clear fabric topology flag before initiating a new FLOGI (bsc#1200045).\n- scsi: lpfc: Commonize VMID code location (bsc#1201193).\n- scsi: lpfc: Copyright updates for 14.2.0.0 patches (bsc#1197675).\n- scsi: lpfc: Copyright updates for 14.2.0.2 patches (bsc#1200045).\n- scsi: lpfc: Correct BDE DMA address assignment for GEN_REQ_WQE (bsc#1200045).\n- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).\n- scsi: lpfc: Correct CRC32 calculation for congestion stats (bsc#1200045).\n- scsi: lpfc: Decrement outstanding gidft_inp counter if lpfc_err_lost_link() (bsc#1200045).\n- scsi: lpfc: Drop lpfc_no_handler() (bsc#1197675).\n- scsi: lpfc: Expand setting ELS_ID field in ELS_REQUEST64_WQE (bsc#1200045).\n- scsi: lpfc: Fill in missing ndlp kref puts in error paths (bsc#1200045).\n- scsi: lpfc: Fix additional reference counting in lpfc_bsg_rport_els() (bsc#1200045).\n- scsi: lpfc: Fix broken SLI4 abort path (bsc#1197675).\n- scsi: lpfc: Fix call trace observed during I/O with CMF enabled (bsc#1200045).\n- scsi: lpfc: Fix diagnostic fw logging after a function reset (bsc#1200045).\n- scsi: lpfc: Fix dmabuf ptr assignment in lpfc_ct_reject_event() (bsc#1200045).\n- scsi: lpfc: Fix element offset in __lpfc_sli_release_iocbq_s4() (bsc#1200045).\n- scsi: lpfc: Fix field overload in lpfc_iocbq data structure (bsc#1200045).\n- scsi: lpfc: Fix locking for lpfc_sli_iocbq_lookup() (bsc#1197675).\n- scsi: lpfc: Fix ndlp put following a LOGO completion (bsc#1200045).\n- scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI (bsc#1200045).\n- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).\n- scsi: lpfc: Fix queue failures when recovering from PCI parity error (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp() (bsc#1200045).\n- scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock (bsc#1200045).\n- scsi: lpfc: Fix split code for FLOGI on FCoE (bsc#1200045).\n- scsi: lpfc: Fix typos in comments (bsc#1197675).\n- scsi: lpfc: Fix unload hang after back to back PCI EEH faults (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Improve PCI EEH Error and Recovery Handling (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Inhibit aborts if external loopback plug is inserted (bsc#1200045).\n- scsi: lpfc: Introduce FC_RSCN_MEMENTO flag for tracking post RSCN completion (bsc#1200045).\n- scsi: lpfc: Kill lpfc_bus_reset_handler() (bsc#1197675).\n- scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() (bsc#1200045).\n- scsi: lpfc: Move MI module parameter check to handle dynamic disable (bsc#1200045).\n- scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT (bsc#1200045).\n- scsi: lpfc: Reduce log messages seen after firmware download (bsc#1197675).\n- scsi: lpfc: Refactor cleanup of mailbox commands (bsc#1200045).\n- scsi: lpfc: Register for Application Services FC-4 type in Fabric topology (bsc#1200045).\n- scsi: lpfc: Remove failing soft_wwn support (bsc#1197675).\n- scsi: lpfc: Remove false FDMI NVMe FC-4 support for NPIV ports (bsc#1200045).\n- scsi: lpfc: Remove NVMe support if kernel has NVME_FC disabled (bsc#1197675).\n- scsi: lpfc: Remove redundant flush_workqueue() call (bsc#1197675).\n- scsi: lpfc: Remove redundant lpfc_sli_prep_wqe() call (bsc#1200045).\n- scsi: lpfc: Remove unnecessary null ndlp check in lpfc_sli_prep_wqe() (bsc#1200045).\n- scsi: lpfc: Remove unnecessary NULL pointer assignment for ELS_RDF path (bsc#1200045).\n- scsi: lpfc: Remove unneeded variable (bsc#1200045).\n- scsi: lpfc: Requeue SCSI I/O to upper layer when fw reports link down (bsc#1200045).\n- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).\n- scsi: lpfc: Revise FDMI reporting of supported port speed for trunk groups (bsc#1200045).\n- scsi: lpfc: Rework FDMI initialization after link up (bsc#1200045).\n- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).\n- scsi: lpfc: SLI path split: Introduce lpfc_prep_wqe (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor Abort paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor base ELS paths and the FLOGI path (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor BSG paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor CT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor fast and slow paths to native SLI4 (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor FDISC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor lpfc_iocbq (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_ACC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_RJT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor misc ELS paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor PLOGI/PRLI/ADISC/LOGO paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor SCSI paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor the RSCN/SCR/RDF/EDC/FARPR paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor VMID paths (bsc#1197675).\n- scsi: lpfc: Transition to NPR state upon LOGO cmpl if link down or aborted (bsc#1200045).\n- scsi: lpfc: Tweak message log categories for ELS/FDMI/NVMe rescan (bsc#1200045).\n- scsi: lpfc: Update fc_prli_sent outstanding only after guaranteed IOCB submit (bsc#1200045).\n- scsi: lpfc: Update lpfc version to 14.2.0.0 (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.1 (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.2 (bsc#1200045).\n- scsi: lpfc: Update lpfc version to 14.2.0.3 (bsc#1200045).\n- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).\n- scsi: lpfc: Update stat accounting for READ_STATUS mbox command (bsc#1200045).\n- scsi: lpfc: Use fc_block_rport() (bsc#1197675).\n- scsi: lpfc: Use irq_set_affinity() (bsc#1197675).\n- scsi: lpfc: Use kcalloc() (bsc#1197675).\n- scsi: lpfc: Use list_for_each_entry_safe() in rscn_recovery_check() (bsc#1200045).\n- scsi: lpfc: Use rport as argument for lpfc_chk_tgt_mapped() (bsc#1197675).\n- scsi: lpfc: Use rport as argument for lpfc_send_taskmgmt() (bsc#1197675).\n- scsi: lpfc: Use sg_dma_address() and sg_dma_len() macros for NVMe I/O (bsc#1200045).\n- scsi: lpfc: Zero SLI4 fcp_cmnd buffer\u0027s fcpCntl0 field (bsc#1200045).\n- scsi: mpt3sas: Fix incorrect 4GB boundary check (git-fixes).\n- scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() (git-fixes).\n- scsi: mpt3sas: Page fault in reply q processing (git-fixes).\n- scsi: mpt3sas: Use cached ATA Information VPD page (git-fixes).\n- scsi: mvsas: Add spin_lock/unlock() to protect asd_sas_port-\u003ephy_list (bsc#1198802).\n- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).\n- scsi: pm8001: Fix abort all task initialization (git-fixes).\n- scsi: pm8001: Fix command initialization in pm8001_chip_ssp_tm_req() (git-fixes).\n- scsi: pm8001: Fix command initialization in pm80XX_send_read_log() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_chip_sata_req() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_chip_ssp_io_req() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_set_sas_protocol_timer_config() (git-fixes).\n- scsi: pm8001: Fix NCQ NON DATA command completion handling (git-fixes).\n- scsi: pm8001: Fix NCQ NON DATA command task initialization (git-fixes).\n- scsi: pm8001: Fix payload initialization in pm80xx_encrypt_update() (git-fixes).\n- scsi: pm8001: Fix payload initialization in pm80xx_set_thermal_config() (git-fixes).\n- scsi: pm80xx: Enable upper inbound, outbound queues (git-fixes).\n- scsi: pm80xx: Mask and unmask upper interrupt vectors 32-63 (git-fixes).\n- scsi: qedi: Fix ABBA deadlock in qedi_process_tmf_resp() and qedi_process_cmd_cleanup_resp() (git-fixes).\n- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).\n- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).\n- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).\n- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).\n- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).\n- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).\n- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).\n- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).\n- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).\n- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).\n- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).\n- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).\n- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).\n- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).\n- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).\n- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).\n- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).\n- scsi: qla2xxx: edif: Remove unneeded variable (bsc#1200046).\n- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).\n- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).\n- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).\n- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).\n- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).\n- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).\n- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).\n- scsi: qla2xxx: Fix crash during module load unload test (bsc#1197661).\n- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).\n- scsi: qla2xxx: Fix disk failure to rediscover (bsc#1197661).\n- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).\n- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).\n- scsi: qla2xxx: Fix hang due to session stuck (bsc#1197661).\n- scsi: qla2xxx: Fix incorrect reporting of task management failure (bsc#1197661).\n- scsi: qla2xxx: Fix laggy FC remote port session recovery (bsc#1197661).\n- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).\n- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).\n- scsi: qla2xxx: Fix loss of NVMe namespaces after driver reload test (bsc#1197661).\n- scsi: qla2xxx: Fix missed DMA unmap for aborted commands (bsc#1200046).\n- scsi: qla2xxx: Fix missed DMA unmap for NVMe ls requests (bsc#1197661).\n- scsi: qla2xxx: Fix N2N inconsistent PLOGI (bsc#1197661).\n- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).\n- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session of PRLI reject (bsc#1197661).\n- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).\n- scsi: qla2xxx: Fix typos in comments (bsc#1197661).\n- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).\n- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).\n- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).\n- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).\n- scsi: qla2xxx: Increase max limit of ql2xnvme_queues (bsc#1197661).\n- scsi: qla2xxx: Reduce false trigger to login (bsc#1197661).\n- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).\n- scsi: qla2xxx: Remove a declaration (bsc#1195823).\n- scsi: qla2xxx: Remove free_sg command flag (bsc#1200046).\n- scsi: qla2xxx: Remove setting of \u0027req\u0027 and \u0027rsp\u0027 parameters (bsc#1201160).\n- scsi: qla2xxx: Remove unneeded flush_workqueue() (bsc#1200046).\n- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).\n- scsi: qla2xxx: Remove unused \u0027ql_dm_tgt_ex_pct\u0027 parameter (bsc#1201160).\n- scsi: qla2xxx: Stop using the SCSI pointer (bsc#1197661).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).\n- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.400-k (bsc#1197661).\n- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).\n- scsi: qla2xxx: Use correct feature type field during RFF_ID processing (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for port_state_str (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for q_dev_state (bsc#1197661).\n- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).\n- scsi: scsi_transport_fc: Fix FPIN Link Integrity statistics counters (git-fixes).\n- scsi: sr: Do not leak information in ioctl (git-fixes).\n- scsi: ufs: core: Exclude UECxx from SFR dump list (git-fixes).\n- scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled (git-fixes).\n- scsi: ufs: qcom: Fix ufs_qcom_resume() (git-fixes).\n- scsi: virtio-scsi: Eliminate anonymous module_init and module_exit (git-fixes).\n- scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() (git-fixes).\n- selftest: KVM: Add open sev dev helper (bsc#1194526).\n- selftests/bpf: Remove unused variable in tc_tunnel prog (git-fixes).\n- selftests: firmware: Fix the request_firmware_into_buf() test for XZ format (git-fixes).\n- selftests: firmware: Use smaller dictionary for XZ compression (git-fixes).\n- selftests: fix check for circular KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM (bsc#1194526).\n- selftests: KVM: Add /x86_64/sev_migrate_tests to .gitignore (bsc#1194526).\n- selftests: KVM: Fix check for !POLLIN in demand_paging_test (bsc#1194526).\n- selftests: kvm: Remove absent target file (git-fixes).\n- selftests: KVM: sev_migrate_tests: Fix sev_ioctl() (bsc#1194526).\n- selftests: kvm/x86: Fix the warning in lib/x86_64/processor.c (bsc#1194526).\n- selftests/powerpc: Add test for real address error handling (jsc#SLE-18194).\n- serial: 8250: Also set sticky MCR bits in console restoration (git-fixes).\n- serial: 8250_aspeed_vuart: add PORT_ASPEED_VUART port type (git-fixes).\n- serial: 8250_aspeed_vuart: Fix potential NULL dereference in aspeed_vuart_probe (git-fixes).\n- serial: 8250: core: Remove unneeded linux/pm_runtime.h (git-fixes).\n- serial: 8250: Correct the clock for EndRun PTP/1588 PCIe device (git-fixes).\n- serial: 8250_fintek: Check SER_RS485_RTS_* only with RS485 (git-fixes).\n- serial: 8250: Fix race condition in RTS-after-send handling (git-fixes).\n- serial: 8250: fix XOFF/XON sending when DMA is used (git-fixes).\n- serial: 8250_lpss: Balance reference count for PCI DMA device (git-fixes).\n- serial: 8250_mid: Balance reference count for PCI DMA device (git-fixes).\n- serial: 8250_mtk: Fix register address for XON/XOFF character (git-fixes).\n- serial: 8250_mtk: Fix UART_EFR register address (git-fixes).\n- serial: 8250: pxa: Remove unneeded linux/pm_runtime.h (git-fixes).\n- serial: core: Fix the definition name in the comment of UPF_* flags (git-fixes).\n- serial: cpm_uart: Fix build error without CONFIG_SERIAL_CPM_CONSOLE (git-fixes).\n- serial: digicolor-usart: Do not allow CS5-6 (git-fixes).\n- serial: imx: fix overrun interrupts in DMA mode (git-fixes).\n- serial: meson: acquire port-\u003elock in startup() (git-fixes).\n- serial: msm_serial: disable interrupts in __msm_console_write() (git-fixes).\n- serial: pch: do not overwrite xmit-\u003ebuf[0] by x_char (git-fixes).\n- serial: rda-uart: Do not allow CS5-6 (git-fixes).\n- serial: samsung_tty: do not unlock port-\u003elock for uart_write_wakeup() (git-fixes).\n- serial: sh-sci: Do not allow CS5-6 (git-fixes).\n- serial: sifive: Report actual baud base rather than fixed 115200 (git-fixes).\n- serial: sifive: Sanitize CSIZE and c_iflag (git-fixes).\n- serial: st-asc: Sanitize CSIZE and correct PARENB for CS7 (git-fixes).\n- serial: stm32-usart: Correct CSIZE, bits, and parity (git-fixes).\n- serial: txx9: Do not allow CS5-6 (git-fixes).\n- sfc: Do not free an empty page_ring (git-fixes).\n- sfc: fallback for lack of xdp tx queues (bsc#1196306).\n- sfc: last resort fallback for lack of xdp tx queues (bsc#1196306).\n- sfc: Use swap() instead of open coding it (bsc#1196306).\n- sfc: use swap() to make code cleaner (bsc#1196306).\n- skbuff: fix coalescing for page_pool fragment recycling (bsc#1190336).\n- slimbus: qcom: Fix IRQ check in qcom_slim_probe (git-fixes).\n- slip: fix macro redefine warning (git-fixes).\n- smb3: add mount parm nosparse (bsc#1193629).\n- smb3: add trace point for lease not found issue (bsc#1193629).\n- smb3: add trace point for oplock not found (bsc#1193629).\n- smb3: check for null tcon (bsc#1193629).\n- smb3: cleanup and clarify status of tree connections (bsc#1193629).\n- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1193629).\n- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1193629).\n- smb3: fix incorrect session setup check for multiuser mounts (bsc#1193629).\n- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1193629).\n- smb3: fix snapshot mount option (bsc#1193629).\n- [smb3] improve error message when mount options conflict with posix (bsc#1193629).\n- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1193629).\n- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1193629).\n- [smb3] move more common protocol header definitions to smbfs_common (bsc#1193629).\n- smb3: send NTLMSSP version information (bsc#1193629).\n- smp: Fix offline cpu check in flush_smp_call_function_queue() (git-fixes).\n- smsc911x: allow using IRQ0 (git-fixes).\n- soc: aspeed: lpc-ctrl: Block error printing on probe defer cases (git-fixes).\n- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).\n- soc: bcm: Check for NULL return of devm_kzalloc() (git-fixes).\n- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).\n- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).\n- soc: fsl: guts: Add a missing memory allocation failure check (git-fixes).\n- soc: fsl: guts: Revert commit 3c0d64e867ed (git-fixes).\n- soc: fsl: qe: Check of ioremap return value (git-fixes).\n- soc: mediatek: pm-domains: Add wakeup capacity support in power domain (git-fixes).\n- soc: qcom: aoss: Expose send for generic usecase (git-fixes).\n- soc: qcom: aoss: Fix missing put_device call in qmp_get (git-fixes).\n- soc: qcom: aoss: remove spurious IRQF_ONESHOT flags (git-fixes).\n- soc: qcom: llcc: Add MODULE_DEVICE_TABLE() (git-fixes).\n- soc: qcom: ocmem: Fix missing put_device() call in of_get_ocmem (git-fixes).\n- soc: qcom: rpmpd: Check for null return of devm_kcalloc (git-fixes).\n- soc: qcom: smp2p: Fix missing of_node_put() in smp2p_parse_ipc (git-fixes).\n- soc: qcom: smsm: Fix missing of_node_put() in smsm_parse_ipc (git-fixes).\n- soc: rockchip: Fix refcount leak in rockchip_grf_init (git-fixes).\n- soc: ti: ti_sci_pm_domains: Check for null return of devm_kcalloc (git-fixes).\n- soc: ti: wkup_m3_ipc: Fix IRQ check in wkup_m3_ipc_probe (git-fixes).\n- sound/oss/dmasound: fix build when drivers are mixed =y/=m (git-fixes).\n- sound/oss/dmasound: fix \u0027dmasound_setup\u0027 defined but not used (git-fixes).\n- soundwire: intel: fix wrong register name in intel_shim_wake (git-fixes).\n- soundwire: intel: prevent pm_runtime resume prior to system suspend (git-fixes).\n- soundwire: qcom: adjust autoenumeration timeout (git-fixes).\n- speakup-dectlk: Restore pitch setting (git-fixes).\n- spi: atmel-quadspi: Fix the buswidth adjustment between spi-mem and controller (git-fixes).\n- spi: bcm-qspi: fix MSPI only access with bcm_qspi_exec_mem_op() (git-fixes).\n- spi: cadence-quadspi: fix incorrect supports_op() return value (git-fixes).\n- spi: cadence-quadspi: fix protocol setup for non-1-1-X operations (git-fixes).\n- spi: core: add dma_map_dev for __spi_unmap_msg() (git-fixes).\n- spi: Fix erroneous sgs value with min_t() (git-fixes).\n- spi: Fix invalid sgs value (git-fixes).\n- spi: Fix Tegra QSPI example (git-fixes).\n- spi: img-spfi: Fix pm_runtime_get_sync() error checking (git-fixes).\n- spi: mxic: Fix the transmit path (git-fixes).\n- spi: pxa2xx-pci: Balance reference count for PCI DMA device (git-fixes).\n- spi: qcom-qspi: Add minItems to interconnect-names (git-fixes).\n- spi: rockchip: Fix error in getting num-cs property (git-fixes).\n- spi: rockchip: fix missing error on unsupported SPI_CS_HIGH (git-fixes).\n- spi: rockchip: Preset cs-high and clk polarity in setup progress (git-fixes).\n- spi: rockchip: Stop spi slave dma receiver when cs inactive (git-fixes).\n- spi: rockchip: terminate dma transmission when slave abort (git-fixes).\n- spi: spi-cadence: Fix kernel-doc format for resume/suspend (git-fixes).\n- spi: spi-fsl-qspi: check return value after calling platform_get_resource_byname() (git-fixes).\n- spi: spi-mtk-nor: initialize spi controller after resume (git-fixes).\n- spi: spi-rspi: Remove setting {src,dst}_{addr,addr_width} based on DMA direction (git-fixes).\n- spi: spi-ti-qspi: Fix return value handling of wait_for_completion_timeout (git-fixes).\n- spi: spi-zynqmp-gqspi: Handle error for dma_set_mask (git-fixes).\n- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).\n- spi: stm32-qspi: Fix wait_cmd timeout in APM mode (git-fixes).\n- spi: tegra114: Add missing IRQ check in tegra_spi_probe (git-fixes).\n- spi: tegra20: Use of_device_get_match_data() (git-fixes).\n- spi: tegra210-quad: Fix missin IRQ check in tegra_qspi_probe (git-fixes).\n- sr9700: sanity check for packet length (bsc#1196836).\n- staging: fbtft: fb_st7789v: reset display before initialization (git-fixes).\n- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).\n- staging: fieldbus: Fix the error handling path in anybuss_host_common_probe() (git-fixes).\n- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).\n- staging:iio:adc:ad7280a: Fix handing of device address bit reversing (git-fixes).\n- staging: most: dim2: force fcnt=3 on Renesas GEN3 (git-fixes).\n- staging: most: dim2: use device release method (git-fixes).\n- staging: most: dim2: use if statements instead of ?: expressions (git-fixes).\n- staging: mt7621-dts: fix formatting (git-fixes).\n- staging: mt7621-dts: fix LEDs and pinctrl on GB-PC1 devicetree (git-fixes).\n- staging: mt7621-dts: fix pinctrl-0 items to be size-1 items on ethernet (git-fixes).\n- staging: mt7621-dts: fix pinctrl properties for ethernet (git-fixes).\n- staging: rtl8712: fix a potential memory leak in r871xu_drv_init() (git-fixes).\n- staging: rtl8712: fix uninit-value in r871xu_drv_init() (git-fixes).\n- staging: rtl8712: fix uninit-value in usb_read8() and friends (git-fixes).\n- staging: rtl8723bs: Fix access-point mode deadlock (git-fixes).\n- staging: vc04_services: shut up out-of-range warning (git-fixes).\n- staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances (git-fixes).\n- staging: vchiq_core: handle NULL result of find_service_by_handle (git-fixes).\n- staging: vchiq: Move certain declarations to vchiq_arm.h (git-fixes).\n- staging: vchiq: Move vchiq char driver to its own file (git-fixes).\n- staging: vchiq: Refactor vchiq cdev code (git-fixes).\n- staging: wfx: fix an error handling in wfx_init_common() (git-fixes).\n- stddef: Introduce DECLARE_FLEX_ARRAY() helper (git-fixes).\n- stm: ltdc: fix two incorrect NULL checks on list iterator (bsc#1190786)\n- SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367).\n- SUNRPC: Do not dereference non-socket transports in sysfs (git-fixes).\n- SUNRPC: Do not dereference non-socket transports in sysfs - kabi fix (git-fixes).\n- SUNRPC do not resend a task on an offlined transport (git-fixes).\n- SUNRPC: Ensure gss-proxy connects on setup (git-fixes).\n- SUNRPC: Ensure that the gssproxy client can start in a connected state (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- SUNRPC: Fix the svc_deferred_event trace class (git-fixes).\n- SUNRPC: Handle ENOMEM in call_transmit_status() (git-fixes).\n- SUNRPC: Handle low memory situations in call_status() (git-fixes).\n- SUNRPC release the transport of a relocated task with an assigned transport (git-fixes).\n- SUNRPC: svc_tcp_sendmsg() should handle errors from xdr_alloc_bvec() (git-fixes).\n- SUNRPC: Trap RDMA segment overflows (git-fixes).\n- SUNRPC: use different lock keys for INET6 and LOCAL (git-fixes).\n- supported.conf: add intel_sdsi\n- supported.conf: mark pfuze100 regulator as supported (bsc#1199909)\n- supported.conf: Support TPM TIS SPI driver (jsc#SLE-24093)\n- surface: surface3_power: Fix battery readings on batteries without a serial number (git-fixes).\n- swiotlb: max mapping size takes min align mask into account (bsc#1197303).\n- sysrq: do not omit current cpu when showing backtrace of all active CPUs (git-fixes).\n- thermal/core: Fix memory leak in __thermal_cooling_device_register() (git-fixes).\n- thermal: core: Fix TZ_GET_TRIP NULL pointer dereference (git-fixes).\n- thermal: devfreq_cooling: use local ops instead of global ops (git-fixes).\n- thermal/drivers/bcm2711: Do not clamp temperature at zero (git-fixes).\n- thermal/drivers/broadcom: Fix potential NULL dereference in sr_thermal_probe (git-fixes).\n- thermal/drivers/imx_sc_thermal: Fix refcount leak in imx_sc_thermal_probe (git-fixes).\n- thermal/drivers/int340x: Improve the tcc offset saving for suspend/resume (git-fixes).\n- thermal: int340x: Check for NULL after calling kmemdup() (git-fixes).\n- thermal: int340x: Fix attr.show callback prototype (git-fixes).\n- thermal: int340x: fix memory leak in int3400_notify() (git-fixes).\n- thermal: int340x: Increase bitmap size (git-fixes).\n- thunderbolt: Use different lane for second DisplayPort tunnel (git-fixes).\n- tick/nohz: unexport __init-annotated tick_nohz_full_setup() (bsc#1201218).\n- tilcdc: tilcdc_external: fix an incorrect NULL check on list iterator (bsc#1190786)\n- timekeeping: Mark NMI safe time accessors as notrace (git-fixes)\n- timers: Fix warning condition in __run_timers() (git-fixes)\n- TOMOYO: fix __setup handlers return values (git-fixes).\n- tools arch x86: Add Intel SDSi provisiong tool (jsc#SLE-18938).\n- tools: bpftool: Complete metrics list in \u0027bpftool prog profile\u0027 doc (git-fixes).\n- tools: bpftool: Document and add bash completion for -L, -B options (git-fixes).\n- tools: bpftool: Update and synchronise option list in doc and help msg (git-fixes).\n- tpm: Fix buffer access in tpm2_get_tpm_pt() (git-fixes).\n- tpm: Fix error handling in async work (git-fixes).\n- tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe() (bsc#1065729).\n- tpm: use try_get_ops() in tpm-space.c (git-fixes).\n- tps6598x: clear int mask on probe failure (git-fixes).\n- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).\n- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).\n- tracing: Fix potential double free in create_var_ref() (git-fixes).\n- tracing: Fix return value of __setup handlers (git-fixes).\n- tracing: Fix return value of trace_pid_write() (git-fixes).\n- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).\n- tracing: Have trace event string test handle zero length strings (git-fixes).\n- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).\n- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).\n- tracing/histogram: Fix sorting on old \u0027cpu\u0027 value (git-fixes).\n- tracing/osnoise: Force quiescent states while tracing (git-fixes).\n- tracing: Propagate is_signed to expression (git-fixes).\n- tracing: Show kretprobe unknown indicator only for kretprobe_trampoline (bsc#1193277).\n- tty: Fix a possible resource leak in icom_probe (git-fixes).\n- tty: fix deadlock caused by calling printk() under tty_port-\u003elock (git-fixes).\n- tty: goldfish: Fix free_irq() on remove (git-fixes).\n- tty: goldfish: Introduce gf_ioread32()/gf_iowrite32() (git-fixes).\n- tty: goldfish: Use tty_port_destroy() to destroy port (git-fixes).\n- tty: n_gsm: Debug output allocation must use GFP_ATOMIC (git-fixes).\n- tty: n_gsm: Do not ignore write return value in gsmld_output() (git-fixes).\n- tty: n_gsm: fix deadlock in gsmtty_open() (git-fixes).\n- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).\n- tty: n_gsm: fix NULL pointer access due to DLCI release (git-fixes).\n- tty: n_gsm: Fix packet data hex dump output (git-fixes).\n- tty: n_gsm: fix proper link termination after failed open (git-fixes).\n- tty: n_gsm: fix wrong modem processing in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix wrong tty control line for flow control (git-fixes).\n- tty: n_tty: do not look ahead for EOL character past the end of the buffer (git-fixes).\n- tty: n_tty: Restore EOF push handling behavior (git-fixes).\n- tty/serial: digicolor: fix possible null-ptr-deref in digicolor_uart_probe() (git-fixes).\n- tty: serial: fsl_lpuart: fix potential bug when using both of_alias_get_id and ida_simple_get (git-fixes).\n- tty: serial: owl: Fix missing clk_disable_unprepare() in owl_uart_probe (git-fixes).\n- tty: synclink_gt: Fix null-pointer-dereference in slgt_clean() (git-fixes).\n- u64_stats: Disable preemption on 32bit UP+SMP PREEMPT_RT during updates (bsc#1189998).\n- uapi/linux/stddef.h: Add include guards (jsc#SLE-18978).\n- ucounts: Enforce RLIMIT_NPROC not RLIMIT_NPROC+1 (bsc#1194191).\n- udmabuf: validate ubuf-\u003epagecount (git-fixes).\n- udp_tunnel: Fix end of loop test in udp_tunnel_nic_unregister() (git-fixes).\n- usb: cdc-wdm: fix reading stuck on device close (git-fixes).\n- usb: cdns3: Fix issue for clear halt endpoint (git-fixes).\n- usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value (git-fixes).\n- usb: cdnsp: Fixed setting last_trb incorrectly (git-fixes).\n- usb: chipidea: udc: check request status before setting device address (git-fixes).\n- usb: core: Do not hold the device lock while sleeping in do_proc_control() (git-fixes).\n- usb: core: hcd: Add support for deferring roothub registration (git-fixes).\n- usb: dwc2: drd: fix soft connect when gadget is unconfigured (git-fixes).\n- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).\n- usb: dwc2: gadget: do not reset gadget\u0027s driver-\u003ebus (git-fixes).\n- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).\n- usb: dwc3: core: Fix tx/rx threshold settings (git-fixes).\n- usb: dwc3: core: Only handle soft-reset in DCTL (git-fixes).\n- usb: dwc3: Decouple USB 2.0 L1 \u0026 L2 events (git-fixes).\n- usb: dwc3: gadget: Change to dev_dbg() when queuing to inactive gadget/ep (git-fixes).\n- usb: dwc3: gadget: ep_queue simplify isoc start condition (git-fixes).\n- usb: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).\n- usb: dwc3: gadget: Give some time to schedule isoc (git-fixes).\n- usb: dwc3: gadget: Ignore Update Transfer cmd params (git-fixes).\n- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).\n- usb: dwc3: gadget: move cmd_endtransfer to extra function (git-fixes).\n- usb: dwc3: gadget: Move null pinter check to proper place (git-fixes).\n- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).\n- usb: dwc3: gadget: Prevent repeat pullup() (git-fixes).\n- usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).\n- usb: dwc3: gadget: Return proper request status (git-fixes).\n- usb: dwc3: gadget: Skip checking Update Transfer status (git-fixes).\n- usb: dwc3: gadget: Skip reading GEVNTSIZn (git-fixes).\n- usb: dwc3: gadget: Wait for ep0 xfers to complete during dequeue (git-fixes).\n- usb: dwc3: Issue core soft reset before enabling run/stop (git-fixes).\n- usb: dwc3: omap: fix \u0027unbalanced disables for smps10_out1\u0027 on omap5evm (git-fixes).\n- usb: dwc3: pci: Add \u0027snps,dis_u2_susphy_quirk\u0027 for Intel Bay Trail (git-fixes).\n- usb: dwc3: pci: add support for the Intel Meteor Lake-P (git-fixes).\n- usb: dwc3: pci: add support for the Intel Raptor Lake-S (git-fixes).\n- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).\n- usb: dwc3: pci: Fix pm_runtime_get_sync() error checking (git-fixes).\n- usb: dwc3: pci: Set the swnode from inside dwc3_pci_quirks() (git-fixes).\n- usb: dwc3: Try usb-role-switch first in dwc3_drd_init (git-fixes).\n- usb: dwc3: xilinx: fix uninitialized return value (git-fixes).\n- usb: ehci: add pci device support for Aspeed platforms (git-fixes).\n- usb: ehci-omap: drop unused ehci_read() function (git-fixes).\n- usb: f_fs: Fix use-after-free for epfile (git-fixes).\n- usb: Fix xhci event ring dequeue pointer ERDP update issue (git-fixes).\n- usb: gadget: configfs: clear deactivation flag in configfs_composite_unbind() (git-fixes).\n- usb: gadget: eliminate anonymous module_init and module_exit (git-fixes).\n- usb: gadget: f_fs: change ep-\u003eep safe in ffs_epfile_io() (git-fixes).\n- usb: gadget: f_fs: change ep-\u003estatus safe in ffs_epfile_io() (git-fixes).\n- USB: gadget: Fix double-free bug in raw_gadget driver (git-fixes).\n- usb: gadget: Fix non-unique driver names in raw-gadget driver (git-fixes).\n- usb: gadget: fix race when gadget driver register via ioctl (git-fixes).\n- usb: gadget: Fix use-after-free bug by not setting udc-\u003edev.driver (git-fixes).\n- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).\n- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).\n- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).\n- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).\n- usb: gadget: rndis: prevent integer overflow in rndis_set_response() (git-fixes).\n- usb: gadget: tegra-xudc: Do not program SPARAM (git-fixes).\n- usb: gadget: tegra-xudc: Fix control endpoint\u0027s definitions (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).\n- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).\n- usb: gadget: uvc: allow for application to cleanly shutdown (git-fixes).\n- usb: gadget: uvc: Fix crash when encoding data for usb request (git-fixes).\n- usb: gadget: uvc: rename function to be more consistent (git-fixes).\n- usb: gadget: validate endpoint index for xilinx udc (git-fixes).\n- usb: gadget: validate interface OS descriptor requests (git-fixes).\n- usb: hcd-pci: Fully suspend across freeze/thaw cycle (git-fixes).\n- usb: hcd-pci: Use PCI_STD_NUM_BARS when checking standard BARs (git-fixes).\n- usb: host: isp116x: check return value after calling platform_get_resource() (git-fixes).\n- usb: isp1760: Fix out-of-bounds array access (git-fixes).\n- usb: misc: fix improper handling of refcount in uss720_probe() (git-fixes).\n- usb: mtu3: fix USB 3.0 dual-role-switch from device to host (git-fixes).\n- usb: musb: Fix missing of_node_put() in omap2430_probe (git-fixes).\n- usbnet: fix memory allocation in helpers (git-fixes).\n- usb: new quirk for Dell Gen 2 devices (git-fixes).\n- usb: phy: generic: Get the vbus supply (git-fixes).\n- usb: quirks: add a Realtek card reader (git-fixes).\n- usb: quirks: add STRING quirk for VCOM device (git-fixes).\n- usb: raw-gadget: fix handling of dual-direction-capable endpoints (git-fixes).\n- usb: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).\n- usb: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).\n- usb: serial: cp210x: add NCR Retail IO box id (git-fixes).\n- usb: serial: cp210x: add PIDs for Kamstrup USB Meter Reader (git-fixes).\n- usb: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).\n- usb: serial: io_ti: add Agilent E5805A support (git-fixes).\n- usb: serial: option: add Fibocom L610 modem (git-fixes).\n- usb: serial: option: add Fibocom MA510 modem (git-fixes).\n- usb: serial: option: add Quectel BG95 modem (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support (git-fixes).\n- usb: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- usb: serial: option: add support for Cinterion MV32-WA/MV32-WB (git-fixes).\n- usb: serial: option: add support for DW5829e (git-fixes).\n- usb: serial: option: add Telit 0x1057, 0x1058, 0x1075 compositions (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- usb: serial: option: add Telit LE910R1 compositions (git-fixes).\n- usb: serial: option: add ZTE MF286D modem (git-fixes).\n- usb: serial: pl2303: add device id for HP LM930 Display (git-fixes).\n- usb: serial: pl2303: add IBM device IDs (git-fixes).\n- USB: serial: pl2303: add support for more HXN (G) types (git-fixes).\n- usb: serial: pl2303: fix GS type detection (git-fixes).\n- usb: serial: pl2303: fix type detection for odd device (git-fixes).\n- usb: serial: qcserial: add support for Sierra Wireless EM7590 (git-fixes).\n- usb: serial: simple: add Nokia phone driver (git-fixes).\n- usb: serial: whiteheat: fix heap overflow in WHITEHEAT_GET_DTR_RTS (git-fixes).\n- usb: storage: karma: fix rio_karma_init return (git-fixes).\n- usb: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes).\n- usb: typec: mux: Check dev_set_name() return value (git-fixes).\n- usb: typec: tcpci: Do not skip cleanup in .remove() on error (git-fixes).\n- usb: typec: tcpci_mt6360: Update for BMC PHY setting (git-fixes).\n- usb: typec: tipd: Forward plug orientation to typec subsystem (git-fixes).\n- usb: typec: ucsi: Fix reuse of completion structure (git-fixes).\n- usb: typec: ucsi: Fix role swapping (git-fixes).\n- usb: ulpi: Call of_node_put correctly (git-fixes).\n- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).\n- usb: usbip: add missing device lock on tweak configuration cmd (git-fixes).\n- usb: usbip: eliminate anonymous module_init and module_exit (git-fixes).\n- usb: usbip: fix a refcount leak in stub_probe() (git-fixes).\n- usb: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes).\n- usb: usbtmc: Fix bug in pipe direction for control transfers (git-fixes).\n- usb: xhci: tegra:Fix PM usage reference leak of tegra_xusb_unpowergate_partitions (git-fixes).\n- usb: zaurus: support another broken Zaurus (git-fixes).\n- vdpasim: allow to enable a vq repeatedly (git-fixes).\n- veth: Ensure eth header is in skb\u0027s linear part (git-fixes).\n- veth: fix races around rq-\u003erx_notify_masked (git-fixes).\n- vfio/ccw: Remove unneeded GFP_DMA (git-fixes).\n- vhost_vdpa: do not setup irq offloading when irq_num 0 (git-fixes).\n- vhost/vsock: do not check owner in vhost_vsock_stop() while releasing (git-fixes).\n- vhost/vsock: fix incorrect used length reported to the guest (git-fixes).\n- video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (git-fixes).\n- video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (git-fixes).\n- video: fbdev: cirrusfb: check pixclock to avoid divide by zero (git-fixes).\n- video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup (git-fixes).\n- video: fbdev: controlfb: Fix COMPILE_TEST build (git-fixes).\n- video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (git-fixes).\n- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes).\n- video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow (git-fixes).\n- video: fbdev: omapfb: acx565akm: replace snprintf with sysfs_emit (git-fixes).\n- video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (git-fixes).\n- video: fbdev: omapfb: panel-dsi-cm: Use sysfs_emit() instead of snprintf() (git-fixes).\n- video: fbdev: omapfb: panel-tpo-td043mtea1: Use sysfs_emit() instead of snprintf() (git-fixes).\n- video: fbdev: pxa3xx-gcu: release the resources correctly in pxa3xx_gcu_probe/remove() (git-fixes).\n- video: fbdev: sm712fb: Fix crash in smtcfb_read() (git-fixes).\n- video: fbdev: sm712fb: Fix crash in smtcfb_write() (git-fixes).\n- video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (git-fixes).\n- video: fbdev: udlfb: properly check endpoint type (bsc#1190497)\n- video: fbdev: udlfb: replace snprintf in show functions with sysfs_emit (git-fixes).\n- video: fbdev: w100fb: Reset global state (git-fixes).\n- virtio-blk: Do not use MAX_DISCARD_SEGMENTS if max_discard_seg is zero (git-fixes).\n- virtio_blk: eliminate anonymous module_init and module_exit (git-fixes).\n- virtio_blk: fix the discard_granularity and discard_alignment queue limits (git-fixes).\n- virtio_console: break out of buf poll on remove (git-fixes).\n- virtio_console: eliminate anonymous module_init and module_exit (git-fixes).\n- virtio: fix virtio transitional ids (git-fixes).\n- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).\n- virtio-net: fix for skb_over_panic inside big mode (git-fixes).\n- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).\n- virtio_net: fix wrong buf address calculation when using xdp (git-fixes).\n- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).\n- virtio-net: realign page_to_skb() after merges (git-fixes).\n- virtio: pci: Fix an error handling path in vp_modern_probe() (git-fixes).\n- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).\n- VMCI: Fix the description of vmci_check_host_caps() (git-fixes).\n- vringh: Fix loop descriptors check in the indirect cases (git-fixes).\n- vsprintf: Fix %pK with kptr_restrict == 0 (bsc#1197889).\n- vsprintf: Fix potential unaligned access (bsc#1198379).\n- vt_ioctl: add array_index_nospec to VT_ACTIVATE (git-fixes).\n- vt_ioctl: fix array_index_nospec in vt_setactivate (git-fixes).\n- vxcan: enable local echo for sent CAN frames (git-fixes).\n- w1: w1_therm: fixes w1_seq for ds28ea00 sensors (git-fixes).\n- watchdog: rti-wdt: Add missing pm_runtime_disable() in probe function (git-fixes).\n- watchdog: rti-wdt: Fix pm_runtime_get_sync() error checking (git-fixes).\n- Watchdog: sp5100_tco: Add initialization using EFCH MMIO (bsc#1199260).\n- watchdog: sp5100_tco: Add support for get_timeleft (bsc#1199260).\n- Watchdog: sp5100_tco: Enable Family 17h+ CPUs (bsc#1199260).\n- Watchdog: sp5100_tco: Move timer initialization into function (bsc#1199260).\n- Watchdog: sp5100_tco: Refactor MMIO base address initialization (bsc#1199260).\n- watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe (git-fixes).\n- watchdog: wdat_wdt: Stop watchdog when rebooting the system (git-fixes).\n- watch_queue: Actually free the watch (git-fixes).\n- watch_queue: Fix NULL dereference in error cleanup (git-fixes).\n- watch_queue: Free the page array when watch_queue is dismantled (git-fixes).\n- wcn36xx: Differentiate wcn3660 from wcn3620 (git-fixes).\n- wifi: mac80211: fix use-after-free in chanctx code (git-fixes).\n- wilc1000: fix crash observed in AP mode with cfg80211_register_netdevice() (git-fixes).\n- wireguard: queueing: use CFI-safe ptr_ring cleanup function (git-fixes).\n- wireguard: selftests: rename DEBUG_PI_LIST to DEBUG_PLIST (git-fixes).\n- wireguard: socket: free skb in send6 when ipv6 is disabled (git-fixes).\n- wireguard: socket: ignore v6 endpoints when ipv6 is disabled (git-fixes).\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n- x86/boot: Add setup_indirect support in early_memremap_is_setup_data() (bsc#1190497).\n- x86/boot: Fix memremap of setup_indirect structures (bsc#1190497).\n- x86/cc: Move arch/x86/{kernel/cc_platform.c coco/core.c} (jsc#SLE-19924).\n- x86/coco: Add API to handle encryption mask (jsc#SLE-19924).\n- x86/coco: Explicitly declare type of confidential computing platform (jsc#SLE-19924).\n- x86/cpu: Add Xeon Icelake-D to list of CPUs that support PPIN (bsc#1190497).\n- x86/cpufeatures: Re-enable ENQCMD (jsc#SLE-24350).\n- x86/cpu: Load microcode during restore_processor_state() (bsc#1190497).\n- x86/fpu: Clear PASID when copying fpstate (jsc#SLE-24350).\n- x86/kprobes: Add UNWIND_HINT_FUNC on kretprobe_trampoline() (bsc#1193277).\n- x86/kprobes: Fixup return address in generic trampoline handler (bsc#1193277).\n- x86/kprobes: Push a fake return address at kretprobe_trampoline (bsc#1193277).\n- x86/kvmclock: Fix Hyper-V Isolated VM boot issue when vCPUs 64 (bsc#1183682).\n- x86/kvm: Do not waste memory if kvmclock is disabled (bsc#1183682).\n- x86/MCE/AMD: Allow thresholding interface updates after init (bsc#1190497).\n- x86/mm/cpa: Generalize __set_memory_enc_pgtable() (jsc#SLE-19924).\n- x86/module: Fix the paravirt vs alternative order (bsc#1190497).\n- x86/pm: Save the MSR validity status at context setup (bsc#1190497).\n- x86/ptrace: Fix xfpregs_set() incorrect xmm clearing (bsc#1190497).\n- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1190497).\n- x86/traps: Demand-populate PASID MSR via #GP (jsc#SLE-24350).\n- x86/traps: Mark do_int3() NOKPROBE_SYMBOL (bsc#1190497).\n- x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits (bsc#1190497).\n- x86/unwind: kABI workaround for unwind_state changes (bsc#1193277).\n- x86/unwind: Recover kretprobe trampoline entry (bsc#1193277).\n- xen/blkfront: fix comment for need_copy (git-fixes).\n- xen: fix is_xen_pmu() (git-fixes).\n- xen: unexport __init-annotated xen_xlate_map_ballooned_pages() (bsc#1201218).\n- xen/x86: obtain full video frame buffer address for Dom0 also under EFI (bsc#1193556).\n- xen/x86: obtain upper 32 bits of video frame buffer address for Dom0 (bsc#1193556).\n- xfs: drop async cache flushes from CIL commits (bsc#1195669).\n- xhci: Allow host runtime PM as default for Intel Alder Lake N xHCI (git-fixes).\n- xhci: Enable runtime PM on second Alderlake controller (git-fixes).\n- xhci: fix garbage USBSTS being logged in some cases (git-fixes).\n- xhci: fix runtime PM imbalance in USB2 resume (git-fixes).\n- xhci: fix uninitialized string returned by xhci_decode_ctrl_ctx() (git-fixes).\n- xhci: increase usb U3 U0 link resume timeout from 100ms to 500ms (git-fixes).\n- xhci: make xhci_handshake timeout for xhci_reset() adjustable (git-fixes).\n- xhci-pci: Allow host runtime PM as default for Intel Meteor Lake xHCI (git-fixes).\n- xhci-pci: Allow host runtime PM as default for Intel Raptor Lake xHCI (git-fixes).\n- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).\n- xhci: re-initialize the HC during resume if HCE was set (git-fixes).\n- xhci: stop polling roothubs after shutdown (git-fixes).\n- xhci: turn off port power in shutdown (git-fixes).\n- xsk: Do not write NULL in SW ring at allocation failure (jsc#SLE-18375).\n- zsmalloc: decouple class actions from zspage works (bsc#1189998).\n- zsmalloc: introduce obj_allocated (bsc#1189998).\n- zsmalloc: introduce some helper functions (bsc#1189998).\n- zsmalloc: move huge compressed obj from page to zspage (bsc#1189998).\n- zsmalloc: remove zspage isolation for migration (bsc#1189998).\n- zsmalloc: rename zs_stat_type to class_stat_type (bsc#1189998).\n- zsmalloc: replace get_cpu_var with local_lock (bsc#1189998).\n- zsmalloc: replace per zpage lock with pool migrate_lock (bsc#1189998).\n- zsmalloc: Stop using slab fields in struct page (bsc#1189998 bsc#1190208).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-2615,SUSE-SLE-Module-Public-Cloud-15-SP4-2022-2615,openSUSE-SLE-15.4-2022-2615",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2615-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:2615-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222615-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:2615-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1089644",
"url": "https://bugzilla.suse.com/1089644"
},
{
"category": "self",
"summary": "SUSE Bug 1103269",
"url": "https://bugzilla.suse.com/1103269"
},
{
"category": "self",
"summary": "SUSE Bug 1118212",
"url": "https://bugzilla.suse.com/1118212"
},
{
"category": "self",
"summary": "SUSE Bug 1121726",
"url": "https://bugzilla.suse.com/1121726"
},
{
"category": "self",
"summary": "SUSE Bug 1137728",
"url": "https://bugzilla.suse.com/1137728"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1157038",
"url": "https://bugzilla.suse.com/1157038"
},
{
"category": "self",
"summary": "SUSE Bug 1157923",
"url": "https://bugzilla.suse.com/1157923"
},
{
"category": "self",
"summary": "SUSE Bug 1175667",
"url": "https://bugzilla.suse.com/1175667"
},
{
"category": "self",
"summary": "SUSE Bug 1179439",
"url": "https://bugzilla.suse.com/1179439"
},
{
"category": "self",
"summary": "SUSE Bug 1179639",
"url": "https://bugzilla.suse.com/1179639"
},
{
"category": "self",
"summary": "SUSE Bug 1180814",
"url": "https://bugzilla.suse.com/1180814"
},
{
"category": "self",
"summary": "SUSE Bug 1183682",
"url": "https://bugzilla.suse.com/1183682"
},
{
"category": "self",
"summary": "SUSE Bug 1183872",
"url": "https://bugzilla.suse.com/1183872"
},
{
"category": "self",
"summary": "SUSE Bug 1184318",
"url": "https://bugzilla.suse.com/1184318"
},
{
"category": "self",
"summary": "SUSE Bug 1184924",
"url": "https://bugzilla.suse.com/1184924"
},
{
"category": "self",
"summary": "SUSE Bug 1187716",
"url": "https://bugzilla.suse.com/1187716"
},
{
"category": "self",
"summary": "SUSE Bug 1188885",
"url": "https://bugzilla.suse.com/1188885"
},
{
"category": "self",
"summary": "SUSE Bug 1189998",
"url": "https://bugzilla.suse.com/1189998"
},
{
"category": "self",
"summary": "SUSE Bug 1190137",
"url": "https://bugzilla.suse.com/1190137"
},
{
"category": "self",
"summary": "SUSE Bug 1190208",
"url": "https://bugzilla.suse.com/1190208"
},
{
"category": "self",
"summary": "SUSE Bug 1190336",
"url": "https://bugzilla.suse.com/1190336"
},
{
"category": "self",
"summary": "SUSE Bug 1190497",
"url": "https://bugzilla.suse.com/1190497"
},
{
"category": "self",
"summary": "SUSE Bug 1190768",
"url": "https://bugzilla.suse.com/1190768"
},
{
"category": "self",
"summary": "SUSE Bug 1190786",
"url": "https://bugzilla.suse.com/1190786"
},
{
"category": "self",
"summary": "SUSE Bug 1190812",
"url": "https://bugzilla.suse.com/1190812"
},
{
"category": "self",
"summary": "SUSE Bug 1191271",
"url": "https://bugzilla.suse.com/1191271"
},
{
"category": "self",
"summary": "SUSE Bug 1191663",
"url": "https://bugzilla.suse.com/1191663"
},
{
"category": "self",
"summary": "SUSE Bug 1192483",
"url": "https://bugzilla.suse.com/1192483"
},
{
"category": "self",
"summary": "SUSE Bug 1193064",
"url": "https://bugzilla.suse.com/1193064"
},
{
"category": "self",
"summary": "SUSE Bug 1193277",
"url": "https://bugzilla.suse.com/1193277"
},
{
"category": "self",
"summary": "SUSE Bug 1193289",
"url": "https://bugzilla.suse.com/1193289"
},
{
"category": "self",
"summary": "SUSE Bug 1193431",
"url": "https://bugzilla.suse.com/1193431"
},
{
"category": "self",
"summary": "SUSE Bug 1193556",
"url": "https://bugzilla.suse.com/1193556"
},
{
"category": "self",
"summary": "SUSE Bug 1193629",
"url": "https://bugzilla.suse.com/1193629"
},
{
"category": "self",
"summary": "SUSE Bug 1193640",
"url": "https://bugzilla.suse.com/1193640"
},
{
"category": "self",
"summary": "SUSE Bug 1193787",
"url": "https://bugzilla.suse.com/1193787"
},
{
"category": "self",
"summary": "SUSE Bug 1193823",
"url": "https://bugzilla.suse.com/1193823"
},
{
"category": "self",
"summary": "SUSE Bug 1193852",
"url": "https://bugzilla.suse.com/1193852"
},
{
"category": "self",
"summary": "SUSE Bug 1194086",
"url": "https://bugzilla.suse.com/1194086"
},
{
"category": "self",
"summary": "SUSE Bug 1194111",
"url": "https://bugzilla.suse.com/1194111"
},
{
"category": "self",
"summary": "SUSE Bug 1194191",
"url": "https://bugzilla.suse.com/1194191"
},
{
"category": "self",
"summary": "SUSE Bug 1194409",
"url": "https://bugzilla.suse.com/1194409"
},
{
"category": "self",
"summary": "SUSE Bug 1194501",
"url": "https://bugzilla.suse.com/1194501"
},
{
"category": "self",
"summary": "SUSE Bug 1194523",
"url": "https://bugzilla.suse.com/1194523"
},
{
"category": "self",
"summary": "SUSE Bug 1194526",
"url": "https://bugzilla.suse.com/1194526"
},
{
"category": "self",
"summary": "SUSE Bug 1194583",
"url": "https://bugzilla.suse.com/1194583"
},
{
"category": "self",
"summary": "SUSE Bug 1194585",
"url": "https://bugzilla.suse.com/1194585"
},
{
"category": "self",
"summary": "SUSE Bug 1194586",
"url": "https://bugzilla.suse.com/1194586"
},
{
"category": "self",
"summary": "SUSE Bug 1194625",
"url": "https://bugzilla.suse.com/1194625"
},
{
"category": "self",
"summary": "SUSE Bug 1194765",
"url": "https://bugzilla.suse.com/1194765"
},
{
"category": "self",
"summary": "SUSE Bug 1194826",
"url": "https://bugzilla.suse.com/1194826"
},
{
"category": "self",
"summary": "SUSE Bug 1194869",
"url": "https://bugzilla.suse.com/1194869"
},
{
"category": "self",
"summary": "SUSE Bug 1195099",
"url": "https://bugzilla.suse.com/1195099"
},
{
"category": "self",
"summary": "SUSE Bug 1195287",
"url": "https://bugzilla.suse.com/1195287"
},
{
"category": "self",
"summary": "SUSE Bug 1195478",
"url": "https://bugzilla.suse.com/1195478"
},
{
"category": "self",
"summary": "SUSE Bug 1195482",
"url": "https://bugzilla.suse.com/1195482"
},
{
"category": "self",
"summary": "SUSE Bug 1195504",
"url": "https://bugzilla.suse.com/1195504"
},
{
"category": "self",
"summary": "SUSE Bug 1195651",
"url": "https://bugzilla.suse.com/1195651"
},
{
"category": "self",
"summary": "SUSE Bug 1195668",
"url": "https://bugzilla.suse.com/1195668"
},
{
"category": "self",
"summary": "SUSE Bug 1195669",
"url": "https://bugzilla.suse.com/1195669"
},
{
"category": "self",
"summary": "SUSE Bug 1195775",
"url": "https://bugzilla.suse.com/1195775"
},
{
"category": "self",
"summary": "SUSE Bug 1195823",
"url": "https://bugzilla.suse.com/1195823"
},
{
"category": "self",
"summary": "SUSE Bug 1195826",
"url": "https://bugzilla.suse.com/1195826"
},
{
"category": "self",
"summary": "SUSE Bug 1195913",
"url": "https://bugzilla.suse.com/1195913"
},
{
"category": "self",
"summary": "SUSE Bug 1195915",
"url": "https://bugzilla.suse.com/1195915"
},
{
"category": "self",
"summary": "SUSE Bug 1195926",
"url": "https://bugzilla.suse.com/1195926"
},
{
"category": "self",
"summary": "SUSE Bug 1195944",
"url": "https://bugzilla.suse.com/1195944"
},
{
"category": "self",
"summary": "SUSE Bug 1195957",
"url": "https://bugzilla.suse.com/1195957"
},
{
"category": "self",
"summary": "SUSE Bug 1195987",
"url": "https://bugzilla.suse.com/1195987"
},
{
"category": "self",
"summary": "SUSE Bug 1196079",
"url": "https://bugzilla.suse.com/1196079"
},
{
"category": "self",
"summary": "SUSE Bug 1196114",
"url": "https://bugzilla.suse.com/1196114"
},
{
"category": "self",
"summary": "SUSE Bug 1196130",
"url": "https://bugzilla.suse.com/1196130"
},
{
"category": "self",
"summary": "SUSE Bug 1196213",
"url": "https://bugzilla.suse.com/1196213"
},
{
"category": "self",
"summary": "SUSE Bug 1196306",
"url": "https://bugzilla.suse.com/1196306"
},
{
"category": "self",
"summary": "SUSE Bug 1196367",
"url": "https://bugzilla.suse.com/1196367"
},
{
"category": "self",
"summary": "SUSE Bug 1196400",
"url": "https://bugzilla.suse.com/1196400"
},
{
"category": "self",
"summary": "SUSE Bug 1196426",
"url": "https://bugzilla.suse.com/1196426"
},
{
"category": "self",
"summary": "SUSE Bug 1196478",
"url": "https://bugzilla.suse.com/1196478"
},
{
"category": "self",
"summary": "SUSE Bug 1196514",
"url": "https://bugzilla.suse.com/1196514"
},
{
"category": "self",
"summary": "SUSE Bug 1196570",
"url": "https://bugzilla.suse.com/1196570"
},
{
"category": "self",
"summary": "SUSE Bug 1196723",
"url": "https://bugzilla.suse.com/1196723"
},
{
"category": "self",
"summary": "SUSE Bug 1196779",
"url": "https://bugzilla.suse.com/1196779"
},
{
"category": "self",
"summary": "SUSE Bug 1196830",
"url": "https://bugzilla.suse.com/1196830"
},
{
"category": "self",
"summary": "SUSE Bug 1196836",
"url": "https://bugzilla.suse.com/1196836"
},
{
"category": "self",
"summary": "SUSE Bug 1196866",
"url": "https://bugzilla.suse.com/1196866"
},
{
"category": "self",
"summary": "SUSE Bug 1196868",
"url": "https://bugzilla.suse.com/1196868"
},
{
"category": "self",
"summary": "SUSE Bug 1196869",
"url": "https://bugzilla.suse.com/1196869"
},
{
"category": "self",
"summary": "SUSE Bug 1196901",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "self",
"summary": "SUSE Bug 1196930",
"url": "https://bugzilla.suse.com/1196930"
},
{
"category": "self",
"summary": "SUSE Bug 1196942",
"url": "https://bugzilla.suse.com/1196942"
},
{
"category": "self",
"summary": "SUSE Bug 1196960",
"url": "https://bugzilla.suse.com/1196960"
},
{
"category": "self",
"summary": "SUSE Bug 1197016",
"url": "https://bugzilla.suse.com/1197016"
},
{
"category": "self",
"summary": "SUSE Bug 1197157",
"url": "https://bugzilla.suse.com/1197157"
},
{
"category": "self",
"summary": "SUSE Bug 1197227",
"url": "https://bugzilla.suse.com/1197227"
},
{
"category": "self",
"summary": "SUSE Bug 1197243",
"url": "https://bugzilla.suse.com/1197243"
},
{
"category": "self",
"summary": "SUSE Bug 1197292",
"url": "https://bugzilla.suse.com/1197292"
},
{
"category": "self",
"summary": "SUSE Bug 1197302",
"url": "https://bugzilla.suse.com/1197302"
},
{
"category": "self",
"summary": "SUSE Bug 1197303",
"url": "https://bugzilla.suse.com/1197303"
},
{
"category": "self",
"summary": "SUSE Bug 1197304",
"url": "https://bugzilla.suse.com/1197304"
},
{
"category": "self",
"summary": "SUSE Bug 1197362",
"url": "https://bugzilla.suse.com/1197362"
},
{
"category": "self",
"summary": "SUSE Bug 1197386",
"url": "https://bugzilla.suse.com/1197386"
},
{
"category": "self",
"summary": "SUSE Bug 1197501",
"url": "https://bugzilla.suse.com/1197501"
},
{
"category": "self",
"summary": "SUSE Bug 1197601",
"url": "https://bugzilla.suse.com/1197601"
},
{
"category": "self",
"summary": "SUSE Bug 1197661",
"url": "https://bugzilla.suse.com/1197661"
},
{
"category": "self",
"summary": "SUSE Bug 1197675",
"url": "https://bugzilla.suse.com/1197675"
},
{
"category": "self",
"summary": "SUSE Bug 1197761",
"url": "https://bugzilla.suse.com/1197761"
},
{
"category": "self",
"summary": "SUSE Bug 1197817",
"url": "https://bugzilla.suse.com/1197817"
},
{
"category": "self",
"summary": "SUSE Bug 1197819",
"url": "https://bugzilla.suse.com/1197819"
},
{
"category": "self",
"summary": "SUSE Bug 1197820",
"url": "https://bugzilla.suse.com/1197820"
},
{
"category": "self",
"summary": "SUSE Bug 1197888",
"url": "https://bugzilla.suse.com/1197888"
},
{
"category": "self",
"summary": "SUSE Bug 1197889",
"url": "https://bugzilla.suse.com/1197889"
},
{
"category": "self",
"summary": "SUSE Bug 1197894",
"url": "https://bugzilla.suse.com/1197894"
},
{
"category": "self",
"summary": "SUSE Bug 1197915",
"url": "https://bugzilla.suse.com/1197915"
},
{
"category": "self",
"summary": "SUSE Bug 1197917",
"url": "https://bugzilla.suse.com/1197917"
},
{
"category": "self",
"summary": "SUSE Bug 1197918",
"url": "https://bugzilla.suse.com/1197918"
},
{
"category": "self",
"summary": "SUSE Bug 1197920",
"url": "https://bugzilla.suse.com/1197920"
},
{
"category": "self",
"summary": "SUSE Bug 1197921",
"url": "https://bugzilla.suse.com/1197921"
},
{
"category": "self",
"summary": "SUSE Bug 1197922",
"url": "https://bugzilla.suse.com/1197922"
},
{
"category": "self",
"summary": "SUSE Bug 1197926",
"url": "https://bugzilla.suse.com/1197926"
},
{
"category": "self",
"summary": "SUSE Bug 1198009",
"url": "https://bugzilla.suse.com/1198009"
},
{
"category": "self",
"summary": "SUSE Bug 1198010",
"url": "https://bugzilla.suse.com/1198010"
},
{
"category": "self",
"summary": "SUSE Bug 1198012",
"url": "https://bugzilla.suse.com/1198012"
},
{
"category": "self",
"summary": "SUSE Bug 1198013",
"url": "https://bugzilla.suse.com/1198013"
},
{
"category": "self",
"summary": "SUSE Bug 1198014",
"url": "https://bugzilla.suse.com/1198014"
},
{
"category": "self",
"summary": "SUSE Bug 1198015",
"url": "https://bugzilla.suse.com/1198015"
},
{
"category": "self",
"summary": "SUSE Bug 1198016",
"url": "https://bugzilla.suse.com/1198016"
},
{
"category": "self",
"summary": "SUSE Bug 1198017",
"url": "https://bugzilla.suse.com/1198017"
},
{
"category": "self",
"summary": "SUSE Bug 1198018",
"url": "https://bugzilla.suse.com/1198018"
},
{
"category": "self",
"summary": "SUSE Bug 1198019",
"url": "https://bugzilla.suse.com/1198019"
},
{
"category": "self",
"summary": "SUSE Bug 1198020",
"url": "https://bugzilla.suse.com/1198020"
},
{
"category": "self",
"summary": "SUSE Bug 1198021",
"url": "https://bugzilla.suse.com/1198021"
},
{
"category": "self",
"summary": "SUSE Bug 1198022",
"url": "https://bugzilla.suse.com/1198022"
},
{
"category": "self",
"summary": "SUSE Bug 1198023",
"url": "https://bugzilla.suse.com/1198023"
},
{
"category": "self",
"summary": "SUSE Bug 1198024",
"url": "https://bugzilla.suse.com/1198024"
},
{
"category": "self",
"summary": "SUSE Bug 1198027",
"url": "https://bugzilla.suse.com/1198027"
},
{
"category": "self",
"summary": "SUSE Bug 1198030",
"url": "https://bugzilla.suse.com/1198030"
},
{
"category": "self",
"summary": "SUSE Bug 1198034",
"url": "https://bugzilla.suse.com/1198034"
},
{
"category": "self",
"summary": "SUSE Bug 1198058",
"url": "https://bugzilla.suse.com/1198058"
},
{
"category": "self",
"summary": "SUSE Bug 1198217",
"url": "https://bugzilla.suse.com/1198217"
},
{
"category": "self",
"summary": "SUSE Bug 1198379",
"url": "https://bugzilla.suse.com/1198379"
},
{
"category": "self",
"summary": "SUSE Bug 1198400",
"url": "https://bugzilla.suse.com/1198400"
},
{
"category": "self",
"summary": "SUSE Bug 1198402",
"url": "https://bugzilla.suse.com/1198402"
},
{
"category": "self",
"summary": "SUSE Bug 1198412",
"url": "https://bugzilla.suse.com/1198412"
},
{
"category": "self",
"summary": "SUSE Bug 1198413",
"url": "https://bugzilla.suse.com/1198413"
},
{
"category": "self",
"summary": "SUSE Bug 1198438",
"url": "https://bugzilla.suse.com/1198438"
},
{
"category": "self",
"summary": "SUSE Bug 1198484",
"url": "https://bugzilla.suse.com/1198484"
},
{
"category": "self",
"summary": "SUSE Bug 1198577",
"url": "https://bugzilla.suse.com/1198577"
},
{
"category": "self",
"summary": "SUSE Bug 1198585",
"url": "https://bugzilla.suse.com/1198585"
},
{
"category": "self",
"summary": "SUSE Bug 1198660",
"url": "https://bugzilla.suse.com/1198660"
},
{
"category": "self",
"summary": "SUSE Bug 1198802",
"url": "https://bugzilla.suse.com/1198802"
},
{
"category": "self",
"summary": "SUSE Bug 1198803",
"url": "https://bugzilla.suse.com/1198803"
},
{
"category": "self",
"summary": "SUSE Bug 1198806",
"url": "https://bugzilla.suse.com/1198806"
},
{
"category": "self",
"summary": "SUSE Bug 1198811",
"url": "https://bugzilla.suse.com/1198811"
},
{
"category": "self",
"summary": "SUSE Bug 1198826",
"url": "https://bugzilla.suse.com/1198826"
},
{
"category": "self",
"summary": "SUSE Bug 1198835",
"url": "https://bugzilla.suse.com/1198835"
},
{
"category": "self",
"summary": "SUSE Bug 1198968",
"url": "https://bugzilla.suse.com/1198968"
},
{
"category": "self",
"summary": "SUSE Bug 1198971",
"url": "https://bugzilla.suse.com/1198971"
},
{
"category": "self",
"summary": "SUSE Bug 1199011",
"url": "https://bugzilla.suse.com/1199011"
},
{
"category": "self",
"summary": "SUSE Bug 1199024",
"url": "https://bugzilla.suse.com/1199024"
},
{
"category": "self",
"summary": "SUSE Bug 1199035",
"url": "https://bugzilla.suse.com/1199035"
},
{
"category": "self",
"summary": "SUSE Bug 1199046",
"url": "https://bugzilla.suse.com/1199046"
},
{
"category": "self",
"summary": "SUSE Bug 1199052",
"url": "https://bugzilla.suse.com/1199052"
},
{
"category": "self",
"summary": "SUSE Bug 1199063",
"url": "https://bugzilla.suse.com/1199063"
},
{
"category": "self",
"summary": "SUSE Bug 1199163",
"url": "https://bugzilla.suse.com/1199163"
},
{
"category": "self",
"summary": "SUSE Bug 1199173",
"url": "https://bugzilla.suse.com/1199173"
},
{
"category": "self",
"summary": "SUSE Bug 1199260",
"url": "https://bugzilla.suse.com/1199260"
},
{
"category": "self",
"summary": "SUSE Bug 1199314",
"url": "https://bugzilla.suse.com/1199314"
},
{
"category": "self",
"summary": "SUSE Bug 1199390",
"url": "https://bugzilla.suse.com/1199390"
},
{
"category": "self",
"summary": "SUSE Bug 1199426",
"url": "https://bugzilla.suse.com/1199426"
},
{
"category": "self",
"summary": "SUSE Bug 1199433",
"url": "https://bugzilla.suse.com/1199433"
},
{
"category": "self",
"summary": "SUSE Bug 1199439",
"url": "https://bugzilla.suse.com/1199439"
},
{
"category": "self",
"summary": "SUSE Bug 1199482",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "self",
"summary": "SUSE Bug 1199487",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "self",
"summary": "SUSE Bug 1199505",
"url": "https://bugzilla.suse.com/1199505"
},
{
"category": "self",
"summary": "SUSE Bug 1199507",
"url": "https://bugzilla.suse.com/1199507"
},
{
"category": "self",
"summary": "SUSE Bug 1199605",
"url": "https://bugzilla.suse.com/1199605"
},
{
"category": "self",
"summary": "SUSE Bug 1199611",
"url": "https://bugzilla.suse.com/1199611"
},
{
"category": "self",
"summary": "SUSE Bug 1199626",
"url": "https://bugzilla.suse.com/1199626"
},
{
"category": "self",
"summary": "SUSE Bug 1199631",
"url": "https://bugzilla.suse.com/1199631"
},
{
"category": "self",
"summary": "SUSE Bug 1199650",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "self",
"summary": "SUSE Bug 1199657",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "self",
"summary": "SUSE Bug 1199674",
"url": "https://bugzilla.suse.com/1199674"
},
{
"category": "self",
"summary": "SUSE Bug 1199736",
"url": "https://bugzilla.suse.com/1199736"
},
{
"category": "self",
"summary": "SUSE Bug 1199793",
"url": "https://bugzilla.suse.com/1199793"
},
{
"category": "self",
"summary": "SUSE Bug 1199839",
"url": "https://bugzilla.suse.com/1199839"
},
{
"category": "self",
"summary": "SUSE Bug 1199875",
"url": "https://bugzilla.suse.com/1199875"
},
{
"category": "self",
"summary": "SUSE Bug 1199909",
"url": "https://bugzilla.suse.com/1199909"
},
{
"category": "self",
"summary": "SUSE Bug 1200015",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "self",
"summary": "SUSE Bug 1200019",
"url": "https://bugzilla.suse.com/1200019"
},
{
"category": "self",
"summary": "SUSE Bug 1200045",
"url": "https://bugzilla.suse.com/1200045"
},
{
"category": "self",
"summary": "SUSE Bug 1200046",
"url": "https://bugzilla.suse.com/1200046"
},
{
"category": "self",
"summary": "SUSE Bug 1200144",
"url": "https://bugzilla.suse.com/1200144"
},
{
"category": "self",
"summary": "SUSE Bug 1200205",
"url": "https://bugzilla.suse.com/1200205"
},
{
"category": "self",
"summary": "SUSE Bug 1200211",
"url": "https://bugzilla.suse.com/1200211"
},
{
"category": "self",
"summary": "SUSE Bug 1200259",
"url": "https://bugzilla.suse.com/1200259"
},
{
"category": "self",
"summary": "SUSE Bug 1200263",
"url": "https://bugzilla.suse.com/1200263"
},
{
"category": "self",
"summary": "SUSE Bug 1200284",
"url": "https://bugzilla.suse.com/1200284"
},
{
"category": "self",
"summary": "SUSE Bug 1200315",
"url": "https://bugzilla.suse.com/1200315"
},
{
"category": "self",
"summary": "SUSE Bug 1200343",
"url": "https://bugzilla.suse.com/1200343"
},
{
"category": "self",
"summary": "SUSE Bug 1200420",
"url": "https://bugzilla.suse.com/1200420"
},
{
"category": "self",
"summary": "SUSE Bug 1200442",
"url": "https://bugzilla.suse.com/1200442"
},
{
"category": "self",
"summary": "SUSE Bug 1200475",
"url": "https://bugzilla.suse.com/1200475"
},
{
"category": "self",
"summary": "SUSE Bug 1200502",
"url": "https://bugzilla.suse.com/1200502"
},
{
"category": "self",
"summary": "SUSE Bug 1200567",
"url": "https://bugzilla.suse.com/1200567"
},
{
"category": "self",
"summary": "SUSE Bug 1200569",
"url": "https://bugzilla.suse.com/1200569"
},
{
"category": "self",
"summary": "SUSE Bug 1200571",
"url": "https://bugzilla.suse.com/1200571"
},
{
"category": "self",
"summary": "SUSE Bug 1200572",
"url": "https://bugzilla.suse.com/1200572"
},
{
"category": "self",
"summary": "SUSE Bug 1200599",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "self",
"summary": "SUSE Bug 1200600",
"url": "https://bugzilla.suse.com/1200600"
},
{
"category": "self",
"summary": "SUSE Bug 1200608",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "self",
"summary": "SUSE Bug 1200611",
"url": "https://bugzilla.suse.com/1200611"
},
{
"category": "self",
"summary": "SUSE Bug 1200619",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "self",
"summary": "SUSE Bug 1200692",
"url": "https://bugzilla.suse.com/1200692"
},
{
"category": "self",
"summary": "SUSE Bug 1200762",
"url": "https://bugzilla.suse.com/1200762"
},
{
"category": "self",
"summary": "SUSE Bug 1200763",
"url": "https://bugzilla.suse.com/1200763"
},
{
"category": "self",
"summary": "SUSE Bug 1200806",
"url": "https://bugzilla.suse.com/1200806"
},
{
"category": "self",
"summary": "SUSE Bug 1200807",
"url": "https://bugzilla.suse.com/1200807"
},
{
"category": "self",
"summary": "SUSE Bug 1200808",
"url": "https://bugzilla.suse.com/1200808"
},
{
"category": "self",
"summary": "SUSE Bug 1200809",
"url": "https://bugzilla.suse.com/1200809"
},
{
"category": "self",
"summary": "SUSE Bug 1200810",
"url": "https://bugzilla.suse.com/1200810"
},
{
"category": "self",
"summary": "SUSE Bug 1200812",
"url": "https://bugzilla.suse.com/1200812"
},
{
"category": "self",
"summary": "SUSE Bug 1200815",
"url": "https://bugzilla.suse.com/1200815"
},
{
"category": "self",
"summary": "SUSE Bug 1200816",
"url": "https://bugzilla.suse.com/1200816"
},
{
"category": "self",
"summary": "SUSE Bug 1200820",
"url": "https://bugzilla.suse.com/1200820"
},
{
"category": "self",
"summary": "SUSE Bug 1200822",
"url": "https://bugzilla.suse.com/1200822"
},
{
"category": "self",
"summary": "SUSE Bug 1200824",
"url": "https://bugzilla.suse.com/1200824"
},
{
"category": "self",
"summary": "SUSE Bug 1200825",
"url": "https://bugzilla.suse.com/1200825"
},
{
"category": "self",
"summary": "SUSE Bug 1200827",
"url": "https://bugzilla.suse.com/1200827"
},
{
"category": "self",
"summary": "SUSE Bug 1200828",
"url": "https://bugzilla.suse.com/1200828"
},
{
"category": "self",
"summary": "SUSE Bug 1200829",
"url": "https://bugzilla.suse.com/1200829"
},
{
"category": "self",
"summary": "SUSE Bug 1200830",
"url": "https://bugzilla.suse.com/1200830"
},
{
"category": "self",
"summary": "SUSE Bug 1200845",
"url": "https://bugzilla.suse.com/1200845"
},
{
"category": "self",
"summary": "SUSE Bug 1200882",
"url": "https://bugzilla.suse.com/1200882"
},
{
"category": "self",
"summary": "SUSE Bug 1200925",
"url": "https://bugzilla.suse.com/1200925"
},
{
"category": "self",
"summary": "SUSE Bug 1201050",
"url": "https://bugzilla.suse.com/1201050"
},
{
"category": "self",
"summary": "SUSE Bug 1201160",
"url": "https://bugzilla.suse.com/1201160"
},
{
"category": "self",
"summary": "SUSE Bug 1201171",
"url": "https://bugzilla.suse.com/1201171"
},
{
"category": "self",
"summary": "SUSE Bug 1201177",
"url": "https://bugzilla.suse.com/1201177"
},
{
"category": "self",
"summary": "SUSE Bug 1201193",
"url": "https://bugzilla.suse.com/1201193"
},
{
"category": "self",
"summary": "SUSE Bug 1201196",
"url": "https://bugzilla.suse.com/1201196"
},
{
"category": "self",
"summary": "SUSE Bug 1201218",
"url": "https://bugzilla.suse.com/1201218"
},
{
"category": "self",
"summary": "SUSE Bug 1201222",
"url": "https://bugzilla.suse.com/1201222"
},
{
"category": "self",
"summary": "SUSE Bug 1201228",
"url": "https://bugzilla.suse.com/1201228"
},
{
"category": "self",
"summary": "SUSE Bug 1201251",
"url": "https://bugzilla.suse.com/1201251"
},
{
"category": "self",
"summary": "SUSE Bug 150300",
"url": "https://bugzilla.suse.com/150300"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26341 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26341/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33061 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4204 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-44879 page",
"url": "https://www.suse.com/security/cve/CVE-2021-44879/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45402 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45402/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0264 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0494 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0494/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0617 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1012 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1016 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1184 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1184/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1198 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1205 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1508 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1508/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1651 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1651/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1652 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1652/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1671 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1679 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1729 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1734 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1734/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1789 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1852 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1966 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1972 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1974 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1998 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20132 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20154 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21123 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21125 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21127 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21166 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21180 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21499 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21499/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2318 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23222 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26365 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26490 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29582 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29582/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29900 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29901 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-30594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-30594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33740 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33741 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33742 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33743 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33981 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-34918 page",
"url": "https://www.suse.com/security/cve/CVE-2022-34918/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-08-01T08:42:02Z",
"generator": {
"date": "2022-08-01T08:42:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:2615-1",
"initial_release_date": "2022-08-01T08:42:02Z",
"revision_history": [
{
"date": "2022-08-01T08:42:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"product": {
"name": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"product_id": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"product": {
"name": "dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"product_id": "dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"product": {
"name": "gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"product_id": "gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.14.21-150400.14.7.1.aarch64",
"product": {
"name": "kernel-azure-5.14.21-150400.14.7.1.aarch64",
"product_id": "kernel-azure-5.14.21-150400.14.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"product": {
"name": "kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"product_id": "kernel-azure-devel-5.14.21-150400.14.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"product": {
"name": "kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"product_id": "kernel-azure-extra-5.14.21-150400.14.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"product": {
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"product_id": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"product": {
"name": "kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"product_id": "kernel-azure-optional-5.14.21-150400.14.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"product": {
"name": "kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"product_id": "kernel-syms-azure-5.14.21-150400.14.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"product": {
"name": "kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"product_id": "kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"product": {
"name": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"product_id": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"product": {
"name": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"product_id": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"product": {
"name": "kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"product_id": "kernel-devel-azure-5.14.21-150400.14.7.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"product": {
"name": "kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"product_id": "kernel-source-azure-5.14.21-150400.14.7.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"product_id": "dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"product_id": "gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.14.21-150400.14.7.1.x86_64",
"product": {
"name": "kernel-azure-5.14.21-150400.14.7.1.x86_64",
"product_id": "kernel-azure-5.14.21-150400.14.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"product_id": "kernel-azure-devel-5.14.21-150400.14.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"product_id": "kernel-azure-extra-5.14.21-150400.14.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"product_id": "kernel-azure-optional-5.14.21-150400.14.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"product_id": "kernel-syms-azure-5.14.21-150400.14.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"product_id": "kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150400.14.7.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64"
},
"product_reference": "kernel-azure-5.14.21-150400.14.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150400.14.7.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64"
},
"product_reference": "kernel-azure-5.14.21-150400.14.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150400.14.7.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64"
},
"product_reference": "kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150400.14.7.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.14.21-150400.14.7.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch"
},
"product_reference": "kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.14.21-150400.14.7.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch"
},
"product_reference": "kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150400.14.7.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64"
},
"product_reference": "kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150400.14.7.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64"
},
"product_reference": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64"
},
"product_reference": "cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64"
},
"product_reference": "dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64"
},
"product_reference": "dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64"
},
"product_reference": "gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64"
},
"product_reference": "gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64"
},
"product_reference": "kernel-azure-5.14.21-150400.14.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64"
},
"product_reference": "kernel-azure-5.14.21-150400.14.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64"
},
"product_reference": "kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64"
},
"product_reference": "kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64"
},
"product_reference": "kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64"
},
"product_reference": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64"
},
"product_reference": "kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64"
},
"product_reference": "kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64"
},
"product_reference": "kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.14.21-150400.14.7.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch"
},
"product_reference": "kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.14.21-150400.14.7.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch"
},
"product_reference": "kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64"
},
"product_reference": "kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64"
},
"product_reference": "kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64"
},
"product_reference": "kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64"
},
"product_reference": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64"
},
"product_reference": "ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64"
},
"product_reference": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
},
"product_reference": "reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-26341",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26341"
}
],
"notes": [
{
"category": "general",
"text": "Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26341",
"url": "https://www.suse.com/security/cve/CVE-2021-26341"
},
{
"category": "external",
"summary": "SUSE Bug 1196901 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "external",
"summary": "SUSE Bug 1201050 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1201050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-33061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33061"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33061",
"url": "https://www.suse.com/security/cve/CVE-2021-33061"
},
{
"category": "external",
"summary": "SUSE Bug 1196426 for CVE-2021-33061",
"url": "https://bugzilla.suse.com/1196426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-33061"
},
{
"cve": "CVE-2021-4204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4204"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory access flaw was found in the Linux kernel\u0027s eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4204",
"url": "https://www.suse.com/security/cve/CVE-2021-4204"
},
{
"category": "external",
"summary": "SUSE Bug 1194111 for CVE-2021-4204",
"url": "https://bugzilla.suse.com/1194111"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-4204"
},
{
"cve": "CVE-2021-44879",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-44879"
}
],
"notes": [
{
"category": "general",
"text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-44879",
"url": "https://www.suse.com/security/cve/CVE-2021-44879"
},
{
"category": "external",
"summary": "SUSE Bug 1195987 for CVE-2021-44879",
"url": "https://bugzilla.suse.com/1195987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-44879"
},
{
"cve": "CVE-2021-45402",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45402"
}
],
"notes": [
{
"category": "general",
"text": "The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45402",
"url": "https://www.suse.com/security/cve/CVE-2021-45402"
},
{
"category": "external",
"summary": "SUSE Bug 1196130 for CVE-2021-45402",
"url": "https://bugzilla.suse.com/1196130"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-45402"
},
{
"cve": "CVE-2022-0264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0264"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the Linux kernel\u0027s eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions \u003c v5.16-rc6",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0264",
"url": "https://www.suse.com/security/cve/CVE-2022-0264"
},
{
"category": "external",
"summary": "SUSE Bug 1194826 for CVE-2022-0264",
"url": "https://bugzilla.suse.com/1194826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-0264"
},
{
"cve": "CVE-2022-0494",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0494"
}
],
"notes": [
{
"category": "general",
"text": "A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0494",
"url": "https://www.suse.com/security/cve/CVE-2022-0494"
},
{
"category": "external",
"summary": "SUSE Bug 1197386 for CVE-2022-0494",
"url": "https://bugzilla.suse.com/1197386"
},
{
"category": "external",
"summary": "SUSE Bug 1207783 for CVE-2022-0494",
"url": "https://bugzilla.suse.com/1207783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-0494"
},
{
"cve": "CVE-2022-0617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0617"
}
],
"notes": [
{
"category": "general",
"text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0617",
"url": "https://www.suse.com/security/cve/CVE-2022-0617"
},
{
"category": "external",
"summary": "SUSE Bug 1196079 for CVE-2022-0617",
"url": "https://bugzilla.suse.com/1196079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-0617"
},
{
"cve": "CVE-2022-1012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1012"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1012",
"url": "https://www.suse.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "SUSE Bug 1199482 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "external",
"summary": "SUSE Bug 1199694 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199694"
},
{
"category": "external",
"summary": "SUSE Bug 1202335 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1202335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-1016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1016"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle \u0027return\u0027 with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1016",
"url": "https://www.suse.com/security/cve/CVE-2022-1016"
},
{
"category": "external",
"summary": "SUSE Bug 1197335 for CVE-2022-1016",
"url": "https://bugzilla.suse.com/1197335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "important"
}
],
"title": "CVE-2022-1016"
},
{
"cve": "CVE-2022-1184",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1184"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u0027s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1184",
"url": "https://www.suse.com/security/cve/CVE-2022-1184"
},
{
"category": "external",
"summary": "SUSE Bug 1198577 for CVE-2022-1184",
"url": "https://bugzilla.suse.com/1198577"
},
{
"category": "external",
"summary": "SUSE Bug 1210859 for CVE-2022-1184",
"url": "https://bugzilla.suse.com/1210859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1198"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1198",
"url": "https://www.suse.com/security/cve/CVE-2022-1198"
},
{
"category": "external",
"summary": "SUSE Bug 1198030 for CVE-2022-1198",
"url": "https://bugzilla.suse.com/1198030"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-1198"
},
{
"cve": "CVE-2022-1205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1205"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1205",
"url": "https://www.suse.com/security/cve/CVE-2022-1205"
},
{
"category": "external",
"summary": "SUSE Bug 1198027 for CVE-2022-1205",
"url": "https://bugzilla.suse.com/1198027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-1205"
},
{
"cve": "CVE-2022-1508",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1508"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1508",
"url": "https://www.suse.com/security/cve/CVE-2022-1508"
},
{
"category": "external",
"summary": "SUSE Bug 1198968 for CVE-2022-1508",
"url": "https://bugzilla.suse.com/1198968"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-1508"
},
{
"cve": "CVE-2022-1651",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1651"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1651",
"url": "https://www.suse.com/security/cve/CVE-2022-1651"
},
{
"category": "external",
"summary": "SUSE Bug 1199433 for CVE-2022-1651",
"url": "https://bugzilla.suse.com/1199433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-1651"
},
{
"cve": "CVE-2022-1652",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1652"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1652",
"url": "https://www.suse.com/security/cve/CVE-2022-1652"
},
{
"category": "external",
"summary": "SUSE Bug 1199063 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1199063"
},
{
"category": "external",
"summary": "SUSE Bug 1200057 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1200057"
},
{
"category": "external",
"summary": "SUSE Bug 1200751 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1200751"
},
{
"category": "external",
"summary": "SUSE Bug 1201034 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1201034"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212307 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1212307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-1652"
},
{
"cve": "CVE-2022-1671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1671"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in rxrpc_preparse_s in net/rxrpc/server_key.c in the Linux kernel. This flaw allows a local attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1671",
"url": "https://www.suse.com/security/cve/CVE-2022-1671"
},
{
"category": "external",
"summary": "SUSE Bug 1199439 for CVE-2022-1671",
"url": "https://bugzilla.suse.com/1199439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-1671"
},
{
"cve": "CVE-2022-1679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1679"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1679",
"url": "https://www.suse.com/security/cve/CVE-2022-1679"
},
{
"category": "external",
"summary": "SUSE Bug 1199487 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "external",
"summary": "SUSE Bug 1201080 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212316 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1212316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1729"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1729",
"url": "https://www.suse.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "SUSE Bug 1199507 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199507"
},
{
"category": "external",
"summary": "SUSE Bug 1199697 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199697"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1201832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "important"
}
],
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1734",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1734"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1734",
"url": "https://www.suse.com/security/cve/CVE-2022-1734"
},
{
"category": "external",
"summary": "SUSE Bug 1199605 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1199605"
},
{
"category": "external",
"summary": "SUSE Bug 1199606 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1199606"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1201832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "important"
}
],
"title": "CVE-2022-1734"
},
{
"cve": "CVE-2022-1789",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1789"
}
],
"notes": [
{
"category": "general",
"text": "With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1789",
"url": "https://www.suse.com/security/cve/CVE-2022-1789"
},
{
"category": "external",
"summary": "SUSE Bug 1199674 for CVE-2022-1789",
"url": "https://bugzilla.suse.com/1199674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-1789"
},
{
"cve": "CVE-2022-1852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1852"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1852",
"url": "https://www.suse.com/security/cve/CVE-2022-1852"
},
{
"category": "external",
"summary": "SUSE Bug 1199875 for CVE-2022-1852",
"url": "https://bugzilla.suse.com/1199875"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-1852"
},
{
"cve": "CVE-2022-1966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1966"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1966",
"url": "https://www.suse.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "SUSE Bug 1200015 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "external",
"summary": "SUSE Bug 1200268 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200268"
},
{
"category": "external",
"summary": "SUSE Bug 1200494 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200494"
},
{
"category": "external",
"summary": "SUSE Bug 1200529 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "important"
}
],
"title": "CVE-2022-1966"
},
{
"cve": "CVE-2022-1972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1972"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1972",
"url": "https://www.suse.com/security/cve/CVE-2022-1972"
},
{
"category": "external",
"summary": "SUSE Bug 1200019 for CVE-2022-1972",
"url": "https://bugzilla.suse.com/1200019"
},
{
"category": "external",
"summary": "SUSE Bug 1200266 for CVE-2022-1972",
"url": "https://bugzilla.suse.com/1200266"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-1972"
},
{
"cve": "CVE-2022-1974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1974"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1974",
"url": "https://www.suse.com/security/cve/CVE-2022-1974"
},
{
"category": "external",
"summary": "SUSE Bug 1200144 for CVE-2022-1974",
"url": "https://bugzilla.suse.com/1200144"
},
{
"category": "external",
"summary": "SUSE Bug 1200265 for CVE-2022-1974",
"url": "https://bugzilla.suse.com/1200265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-1974"
},
{
"cve": "CVE-2022-1998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1998"
}
],
"notes": [
{
"category": "general",
"text": "A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1998",
"url": "https://www.suse.com/security/cve/CVE-2022-1998"
},
{
"category": "external",
"summary": "SUSE Bug 1200284 for CVE-2022-1998",
"url": "https://bugzilla.suse.com/1200284"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-1998"
},
{
"cve": "CVE-2022-20132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20132"
}
],
"notes": [
{
"category": "general",
"text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20132",
"url": "https://www.suse.com/security/cve/CVE-2022-20132"
},
{
"category": "external",
"summary": "SUSE Bug 1200619 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "external",
"summary": "SUSE Bug 1212287 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1212287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20154"
}
],
"notes": [
{
"category": "general",
"text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20154",
"url": "https://www.suse.com/security/cve/CVE-2022-20154"
},
{
"category": "external",
"summary": "SUSE Bug 1200599 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "external",
"summary": "SUSE Bug 1200608 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-21123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21123"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21123",
"url": "https://www.suse.com/security/cve/CVE-2022-21123"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209075 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1209075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-21125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21125"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21125",
"url": "https://www.suse.com/security/cve/CVE-2022-21125"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209074 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1209074"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21127"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21127",
"url": "https://www.suse.com/security/cve/CVE-2022-21127"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21127",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21127",
"url": "https://bugzilla.suse.com/1200549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-21127"
},
{
"cve": "CVE-2022-21166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21166"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21166",
"url": "https://www.suse.com/security/cve/CVE-2022-21166"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209073 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1209073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21180"
}
],
"notes": [
{
"category": "general",
"text": "Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21180",
"url": "https://www.suse.com/security/cve/CVE-2022-21180"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1212313 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1212313"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-21180"
},
{
"cve": "CVE-2022-21499",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21499"
}
],
"notes": [
{
"category": "general",
"text": "KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21499",
"url": "https://www.suse.com/security/cve/CVE-2022-21499"
},
{
"category": "external",
"summary": "SUSE Bug 1199426 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1199426"
},
{
"category": "external",
"summary": "SUSE Bug 1200059 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1200059"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1203034"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212315 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1212315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "important"
}
],
"title": "CVE-2022-21499"
},
{
"cve": "CVE-2022-2318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2318"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2318",
"url": "https://www.suse.com/security/cve/CVE-2022-2318"
},
{
"category": "external",
"summary": "SUSE Bug 1201251 for CVE-2022-2318",
"url": "https://bugzilla.suse.com/1201251"
},
{
"category": "external",
"summary": "SUSE Bug 1212303 for CVE-2022-2318",
"url": "https://bugzilla.suse.com/1212303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-2318"
},
{
"cve": "CVE-2022-23222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23222"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23222",
"url": "https://www.suse.com/security/cve/CVE-2022-23222"
},
{
"category": "external",
"summary": "SUSE Bug 1194765 for CVE-2022-23222",
"url": "https://bugzilla.suse.com/1194765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-23222"
},
{
"cve": "CVE-2022-26365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26365"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26365",
"url": "https://www.suse.com/security/cve/CVE-2022-26365"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-26365",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-26365"
},
{
"cve": "CVE-2022-26490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26490"
}
],
"notes": [
{
"category": "general",
"text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26490",
"url": "https://www.suse.com/security/cve/CVE-2022-26490"
},
{
"category": "external",
"summary": "SUSE Bug 1196830 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1196830"
},
{
"category": "external",
"summary": "SUSE Bug 1201656 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1201656"
},
{
"category": "external",
"summary": "SUSE Bug 1201969 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1201969"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "important"
}
],
"title": "CVE-2022-26490"
},
{
"cve": "CVE-2022-29582",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29582"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29582",
"url": "https://www.suse.com/security/cve/CVE-2022-29582"
},
{
"category": "external",
"summary": "SUSE Bug 1198811 for CVE-2022-29582",
"url": "https://bugzilla.suse.com/1198811"
},
{
"category": "external",
"summary": "SUSE Bug 1199750 for CVE-2022-29582",
"url": "https://bugzilla.suse.com/1199750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "important"
}
],
"title": "CVE-2022-29582"
},
{
"cve": "CVE-2022-29900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29900"
}
],
"notes": [
{
"category": "general",
"text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29900",
"url": "https://www.suse.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29901"
}
],
"notes": [
{
"category": "general",
"text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29901",
"url": "https://www.suse.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-30594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-30594"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-30594",
"url": "https://www.suse.com/security/cve/CVE-2022-30594"
},
{
"category": "external",
"summary": "SUSE Bug 1199505 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1199505"
},
{
"category": "external",
"summary": "SUSE Bug 1199602 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1199602"
},
{
"category": "external",
"summary": "SUSE Bug 1201549 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1201549"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1204132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "important"
}
],
"title": "CVE-2022-30594"
},
{
"cve": "CVE-2022-33740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33740"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33740",
"url": "https://www.suse.com/security/cve/CVE-2022-33740"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-33740",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-33740"
},
{
"cve": "CVE-2022-33741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33741"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33741",
"url": "https://www.suse.com/security/cve/CVE-2022-33741"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-33741",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-33741"
},
{
"cve": "CVE-2022-33742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33742"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33742",
"url": "https://www.suse.com/security/cve/CVE-2022-33742"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-33742",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-33742"
},
{
"cve": "CVE-2022-33743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33743"
}
],
"notes": [
{
"category": "general",
"text": "network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33743",
"url": "https://www.suse.com/security/cve/CVE-2022-33743"
},
{
"category": "external",
"summary": "SUSE Bug 1200763 for CVE-2022-33743",
"url": "https://bugzilla.suse.com/1200763"
},
{
"category": "external",
"summary": "SUSE Bug 1201629 for CVE-2022-33743",
"url": "https://bugzilla.suse.com/1201629"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "important"
}
],
"title": "CVE-2022-33743"
},
{
"cve": "CVE-2022-33981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33981"
}
],
"notes": [
{
"category": "general",
"text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33981",
"url": "https://www.suse.com/security/cve/CVE-2022-33981"
},
{
"category": "external",
"summary": "SUSE Bug 1200692 for CVE-2022-33981",
"url": "https://bugzilla.suse.com/1200692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-34918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-34918"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-34918",
"url": "https://www.suse.com/security/cve/CVE-2022-34918"
},
{
"category": "external",
"summary": "SUSE Bug 1201171 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201171"
},
{
"category": "external",
"summary": "SUSE Bug 1201177 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201177"
},
{
"category": "external",
"summary": "SUSE Bug 1201222 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-extra-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-livepatch-devel-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-azure-optional-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-source-azure-5.14.21-150400.14.7.1.noarch",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-azure-5.14.21-150400.14.7.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-azure-5.14.21-150400.14.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-01T08:42:02Z",
"details": "important"
}
],
"title": "CVE-2022-34918"
}
]
}
suse-su-2022:2629-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).\n- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).\n- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).\n- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n- CVE-2020-26541: Enforce the secure boot forbidden signature database (aka dbx) protection mechanism. (bsc#1177282)\n- CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).\n- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).\n- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via Spectre like attacks (bsc#1199650).\n- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via Spectre like attacks (bsc#1199650).\n- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via Spectre like attacks (bsc#1199650).\n- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via Spectre like attacks (bsc#1199650).\n- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via Spectre like attacks (bsc#1199650).\n- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).\n- CVE-2022-1966: Fixed an use-after-free bug in the netfilter subsystem. This flaw allowed a local attacker with user access to cause a privilege escalation issue. (bnc#1200015)\n- CVE-2022-1975: Fixed a sleep-in-atomic bug that allows attacker to crash linux kernel by simulating nfc device from user-space. (bsc#1200143)\n- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)\n- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)\n- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).\n- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)\n- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it\u0027s been trivial to break out of it with kgdb or kdb. (bsc#1199426)\n- CVE-2022-1836: Fixed a bug in the floppy submodule disabling FDRAWCMD by default. (bsc#1198866)\n- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).\n- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)\n- CVE-2021-39711: In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1197219).\n- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).\n- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).\n\nThe following non-security bugs were fixed:\n\n- ACPI: property: Release subnode properties with data nodes (git-fixes).\n- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes)\n- arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (git-fixes)\n- arm64: avoid fixmap race condition when create pud mapping (git-fixes)\n- arm64: avoid -Woverride-init warning (git-fixes)\n- arm64: berlin: Select DW_APB_TIMER_OF (git-fixes) Update arm64 default config too.\n- arm64: clear_page() shouldn\u0027t use DC ZVA when DCZID_EL0.DZP == 1 (git-fixes).\n- arm64: cpufeature: Fix the type of no FP/SIMD capability (git-fixes)\n- arm64: cpufeature: Set the FP/SIMD compat HWCAP bits properly (git-fixes)\n- arm64: csum: Fix handling of bad packets (git-fixes)\n- arm64: Extend workaround for erratum 1024718 to all versions of (git-fixes)\n- arm64: fix inline asm in load_unaligned_zeropad() (git-fixes)\n- arm64: fix the flush_icache_range arguments in machine_kexec (git-fixes)\n- arm64: futex: Restore oldval initialization to work around buggy (git-fixes)\n- arm64: hibernate: check pgd table allocation (git-fixes)\n- arm64: hugetlb: avoid potential NULL dereference (git-fixes)\n- arm64: hw_breakpoint: Do not invoke overflow handler on uaccess (git-fixes)\n- arm64: kbuild: remove compressed images on \u0027make ARCH=arm64 (git-fixes)\n- arm64: kdump: update ppos when reading elfcorehdr (git-fixes)\n- arm64: kgdb: Fix single-step exception handling oops (git-fixes)\n- arm64: module: remove (NOLOAD) from linker script (git-fixes)\n- arm64 module: set plt* section addresses to 0x0 (git-fixes)\n- arm64: perf: Report the PC value in REGS_ABI_32 mode (git-fixes)\n- arm64: ptrace: nofpsimd: Fail FP/SIMD regset operations (git-fixes)\n- arm64: ptrace: Override SPSR.SS when single-stepping is enabled (git-fixes)\n- arm64: smp: fix crash_smp_send_stop() behaviour (git-fixes)\n- arm64: smp: fix smp_send_stop() behaviour (git-fixes)\n- arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess (git-fixes)\n- arm64: uprobe: Return EOPNOTSUPP for AARCH32 instruction probing (git-fixes)\n- audit: fix a race condition with the auditd tracking code (bsc#1197170).\n- block: bio-integrity: Advance seed correctly for larger interval sizes (git-fixes).\n- bnxt_en: Remove the setting of dev_port (git-fixes).\n- bonding: fix bond_neigh_init() (git-fixes).\n- btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized (bsc#1199399).\n- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).\n- cgroup/cpuset: Remove cpus_allowed/mems_allowed setup in cpuset_init_smp() (bsc#1199839).\n- cputime, cpuacct: Include guest time in user time in (git-fixes)\n- crypto: ixp4xx - dma_unmap the correct address (git-fixes).\n- crypto: qat - do not cast parameter in bit operations (git-fixes).\n- crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() (bsc#1197601).\n- crypto: virtio - deal with unsupported input sizes (git-fixes).\n- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- dm crypt: Avoid percpu_counter spinlock contention in crypt_page_alloc() (git-fixes).\n- drbd: fix an invalid memory access caused by incorrect use of list iterator (git-fixes).\n- drbd: fix duplicate array initializer (git-fixes).\n- drbd: Fix five use after free bugs in get_initial_state (git-fixes).\n- drbd: remove assign_p_sizes_qlim (git-fixes).\n- drbd: use bdev_alignment_offset instead of queue_alignment_offset (git-fixes).\n- drbd: use bdev based limit helpers in drbd_send_sizes (git-fixes).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- fs-writeback: writeback_sb_inodes Recalculate \u0027wrote\u0027 according skipped pages (bsc#1200873).\n- i40e: always propagate error value in i40e_set_vsi_promisc() (git-fixes).\n- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).\n- i40e: fix return of uninitialized aq_ret in i40e_set_vsi_promisc (git-fixes).\n- i40e: Fix the conditional for i40e_vc_validate_vqs_bitmaps (git-fixes).\n- i40e: Fix virtchnl_queue_select bitmap validation (git-fixes).\n- i40e: Refactoring VF MAC filters counting to make more reliable (git-fixes).\n- i40e: Remove scheduling while atomic possibility (git-fixes).\n- i915_vma: Rename vma_lookup to i915_vma_lookup (git-fixes).\n- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- Input: aiptek - properly check endpoint type (git-fixes).\n- Input: appletouch - initialize work before device registration (git-fixes).\n- Input: bcm5974 - set missing URB_NO_TRANSFER_DMA_MAP urb flag (git-fixes).\n- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).\n- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).\n- Input: elantench - fix misreporting trackpoint coordinates (git-fixes).\n- Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes).\n- Input: spaceball - fix parsing of movement data packets (git-fixes).\n- Input: ti_am335x_tsc - fix STEPCONFIG setup for Z2 (git-fixes).\n- Input: ti_am335x_tsc - set ADCREFM for X configuration (git-fixes).\n- Input: xpad - add support for another USB ID of Nacon GC-100 (git-fixes).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- KVM: arm64: Fix definition of PAGE_HYP_DEVICE (git-fixes)\n- kvm: fix wrong exception emulation in check_rdtsc (git-fixes).\n- kvm: i8254: remove redundant assignment to pointer s (git-fixes).\n- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (git-fixes).\n- KVM: PPC: Fix TCE handling for VFIO (bsc#1061840 git-fixes).\n- KVM: PPC: Propagate errors to the guest when failed instead of ignoring (bsc#1061840 git-fixes).\n- KVM: s390: vsie/gmap: reduce gmap_rmap overhead (git-fixes).\n- KVM: x86: Allocate new rmap and large page tracking when moving memslot (git-fixes).\n- KVM: x86: always stop emulation on page fault (git-fixes).\n- KVM: x86: clear stale x86_emulate_ctxt-\u003eintercept value (git-fixes).\n- KVM: x86: clflushopt should be treated as a no-op by emulation (git-fixes).\n- kvm: x86/cpuid: Only provide CPUID leaf 0xA if host has architectural PMU (git-fixes).\n- KVM: x86: Do not force set BSP bit when local APIC is managed by userspace (git-fixes).\n- KVM: x86: do not modify masked bits of shared MSRs (git-fixes).\n- KVM: x86/emulator: Defer not-present segment check in __load_segment_descriptor() (git-fixes).\n- KVM: x86: Fix emulation in writing cr8 (git-fixes).\n- KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce (git-fixes).\n- KVM: x86: Fix potential put_fpu() w/o load_fpu() on MPX platform (git-fixes).\n- KVM: x86: Fix x86_decode_insn() return when fetching insn bytes fails (git-fixes).\n- KVM: x86: Free wbinvd_dirty_mask if vCPU creation fails (git-fixes).\n- kvm: x86: Improve emulation of CPUID leaves 0BH and 1FH (git-fixes).\n- KVM: x86: Inject #GP if guest attempts to toggle CR4.LA57 in 64-bit mode (git-fixes).\n- KVM: x86: Manually calculate reserved bits when loading PDPTRS (git-fixes).\n- KVM: x86: Manually flush collapsible SPTEs only when toggling flags (git-fixes).\n- KVM: x86: Migrate the PIT only if vcpu0 is migrated, not any BSP (git-fixes).\n- KVM: x86/mmu: Treat invalid shadow pages as obsolete (git-fixes).\n- KVM: x86: Refactor prefix decoding to prevent Spectre-v1/L1TF attacks (git-fixes).\n- KVM: x86: Remove spurious clearing of async #PF MSR (git-fixes).\n- KVM: x86: Remove spurious kvm_mmu_unload() from vcpu destruction path (git-fixes).\n- KVM: x86: remove stale comment from struct x86_emulate_ctxt (git-fixes).\n- KVM: x86: set ctxt-\u003ehave_exception in x86_decode_insn() (git-fixes).\n- KVM: x86: skip populating logical dest map if apic is not sw enabled (git-fixes).\n- KVM: x86: Trace the original requested CPUID function in kvm_cpuid() (git-fixes).\n- KVM: x86: Update vCPU\u0027s hv_clock before back to guest when tsc_offset is adjusted (git-fixes).\n- lpfc: drop driver update 14.2.0.x The amount of backport changes necessary for due to the refactoring is introducing to much code churn and is likely to introduce regressions. This ends the backport effort to keep the lpfc in sync with mainline.\n- lpfc: Set default protocol support to FCP only (bsc#1194124 bsc#1198899).\n- md: bcache: check the return value of kzalloc() in detached_dev_do_request() (git-fixes).\n- md: fix an incorrect NULL check in does_sb_need_changing (git-fixes).\n- md: fix an incorrect NULL check in md_reload_sb (git-fixes).\n- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).\n- media: cpia2: fix control-message timeouts (git-fixes).\n- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).\n- media: dib0700: fix undefined behavior in tuner shutdown (git-fixes).\n- media: dmxdev: fix UAF when dvb_register_device() fails (git-fixes).\n- media: em28xx: fix control-message timeouts.\n- media: flexcop-usb: fix control-message timeouts (git-fixes).\n- media: mceusb: fix control-message timeouts (git-fixes).\n- media: mtk-vpu: Fix a resource leak in the error handling path of \u0027mtk_vpu_probe()\u0027 (git-fixes).\n- media: netup_unidvb: Do not leak SPI master in probe error path (git-fixes).\n- media: pvrusb2: fix control-message timeouts (git-fixes).\n- media: redrat3: fix control-message timeouts (git-fixes).\n- media: s2255: fix control-message timeouts (git-fixes).\n- media: stk1160: fix control-message timeouts (git-fixes).\n- media: vim2m: Remove surplus name initialization (git-fixes).\n- mm: add vma_lookup(), update find_vma_intersection() comments (git-fixes).\n- mm, page_alloc: fix build_zonerefs_node() (git-fixes).\n- netfilter: conntrack: connection timeout after re-register (bsc#1199035).\n- netfilter: conntrack: move synack init code to helper (bsc#1199035).\n- netfilter: conntrack: re-init state for retransmitted syn-ack (bsc#1199035).\n- netfilter: nf_conntrack_tcp: preserve liberal flag in tcp options (bsc#1199035).\n- netfilter: nf_conntrack_tcp: re-init for syn packets only (bsc#1199035).\n- netfilter: nf_tables: disallow non-stateful expression in sets earlier (bsc#1200015).\n- net/mlx5: Avoid double free of root ns in the error flow path (git-fixes).\n- net/mlx5e: Replace reciprocal_scale in TX select queue function (git-fixes).\n- net/mlx5e: Switch to Toeplitz RSS hash by default (git-fixes).\n- net/mlx5: Fix auto group size calculation (git-fixes).\n- net: qed: Disable aRFS for NPAR and 100G (git-fixes).\n- net: qede: Disable aRFS for NPAR and 100G (git-fixes).\n- net: sched: fixed barrier to prevent skbuff sticking in qdisc backlog (git-fixes).\n- net: stmmac: update rx tail pointer register to fix rx dma hang issue (git-fixes).\n- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- NFS: limit use of ACCESS cache for negative responses (bsc#1196570).\n- NFSv4: Do not invalidate inode attributes on delegation return (git-fixes).\n- PCI/ACPI: Allow D3 only if Root Port can signal and wake from D3 (git-fixes).\n- PCI / ACPI: Mark expected switch fall-through (git-fixes).\n- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).\n- PCI: Tidy comments (git-fixes).\n- platform/chrome: cros_ec_proto: Send command again when timeout occurs (git-fixes).\n- powerpc/64s: Add CPU_FTRS_POWER9_DD2_2 to CPU_FTRS_ALWAYS mask (bsc#1061840 git-fixes).\n- powerpc: Enable the DAWR on POWER9 DD2.3 and above (bsc#1055117 ltc#159753).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/numa: Prefer node id queried from vphn (bsc#1199237 bsc#1200173 ltc#198329).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- powerpc/powernv: Get L1D flush requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Get STF barrier requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Remove POWER9 PVR version check for entry and uaccess flushes (bsc#1188885 ltc#193722 git-fixes).\n- powerpc: Remove Power8 DD1 from cputable (bsc#1055117 ltc#159753).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- powerpc/xive: Add some error handling code to \u0027xive_spapr_init()\u0027 (git-fixes).\n- powerpc/xive: Fix refcount leak in xive_spapr_init (git-fixes).\n- qed: Enable automatic recovery on error condition (bsc#1196964).\n- raid5: introduce MD_BROKEN (git-fixes).\n- s390: fix detection of vector enhancements facility 1 vs. vector packed decimal facility (git-fixes).\n- s390: fix strrchr() implementation (git-fixes).\n- s390/ftrace: fix ftrace_update_ftrace_func implementation (git-fixes).\n- s390/gmap: do not unconditionally call pte_unmap_unlock() in __gmap_zap() (git-fixes).\n- s390/gmap: validate VMA in __gmap_zap() (git-fixes).\n- s390/mm: fix VMA and page table handling code in storage key handling functions (git-fixes).\n- s390/mm: validate VMA in PGSTE manipulation functions (git-fixes).\n- sched/core: Add __sched tag for io_schedule() (git-fixes)\n- sched/core: Fix comment regarding nr_iowait_cpu() and (git-fixes)\n- sched/debug: Remove mpol_get/put and task_lock/unlock from (git-fixes)\n- scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe (git-fixes).\n- scsi: dc395x: Fix a missing check on list iterator (git-fixes).\n- scsi: fnic: Fix a tracing statement (git-fixes).\n- scsi: fnic: Replace DMA mask of 64 bits with 47 bits (bsc#1199631).\n- scsi: hisi_sas: Change permission of parameter prot_mask (git-fixes).\n- scsi: pm8001: Fix abort all task initialization (git-fixes).\n- scsi: pm8001: Fix command initialization in pm8001_chip_ssp_tm_req() (git-fixes).\n- scsi: pm8001: Fix command initialization in pm80XX_send_read_log() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_chip_sata_req() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_chip_ssp_io_req() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_set_sas_protocol_timer_config() (git-fixes).\n- scsi: pm8001: Fix NCQ NON DATA command completion handling (git-fixes).\n- scsi: pm8001: Fix NCQ NON DATA command task initialization (git-fixes).\n- scsi: pm8001: Fix payload initialization in pm80xx_encrypt_update() (git-fixes).\n- scsi: pm8001: Fix payload initialization in pm80xx_set_thermal_config() (git-fixes).\n- scsi: qla2xxx: edif: Remove unneeded variable (bsc#1200045).\n- scsi: qla2xxx: Fix missed DMA unmap for aborted commands (bsc#1200045).\n- scsi: qla2xxx: Remove free_sg command flag (bsc#1200045).\n- scsi: qla2xxx: Remove unneeded flush_workqueue() (bsc#1200045).\n- scsi: sr: Do not leak information in ioctl (git-fixes).\n- scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled (git-fixes).\n- scsi: ufs: qcom: Fix ufs_qcom_resume() (git-fixes).\n- scsi: virtio-scsi: Eliminate anonymous module_init and module_exit (git-fixes).\n- scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() (git-fixes).\n- smp: Fix offline cpu check in flush_smp_call_function_queue() (git-fixes).\n- SUNRPC: Ensure gss-proxy connects on setup (git-fixes).\n- SUNRPC: Ensure that the gssproxy client can start in a connected state (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- target: remove an incorrect unmap zeroes data deduction (git-fixes).\n- timekeeping: Really make sure wall_to_monotonic isn\u0027t (git-fixes)\n- tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe() (bsc#1065729).\n- tracing: Fix return value of trace_pid_write() (git-fixes).\n- usb: cdc-wdm: fix reading stuck on device close (git-fixes).\n- usb: dwc3: core: Only handle soft-reset in DCTL (git-fixes).\n- usb: dwc3: gadget: Do not send unintended link state change (git-fixes).\n- usb: hub: Fix locking issues with address0_mutex (git-fixes).\n- usb: mtu3: fix USB 3.0 dual-role-switch from device to host (git-fixes).\n- usb: musb: Fix missing of_node_put() in omap2430_probe (git-fixes).\n- usb: quirks: add a Realtek card reader (git-fixes).\n- usb: quirks: add STRING quirk for VCOM device (git-fixes).\n- usb: serial: cp210x: add PIDs for Kamstrup USB Meter Reader (git-fixes).\n- usb: serial: option: add Fibocom L610 modem (git-fixes).\n- usb: serial: option: add Fibocom MA510 modem (git-fixes).\n- USB: serial: option: add Quectel BG95 modem (git-fixes).\n- usb: serial: option: add support for Cinterion MV32-WA/MV32-WB (git-fixes).\n- usb: serial: option: add Telit 0x1057, 0x1058, 0x1075 compositions (git-fixes).\n- usb: serial: pl2303: add device id for HP LM930 Display (git-fixes).\n- usb: serial: qcserial: add support for Sierra Wireless EM7590 (git-fixes).\n- usb: serial: whiteheat: fix heap overflow in WHITEHEAT_GET_DTR_RTS (git-fixes).\n- USB: storage: karma: fix rio_karma_init return (git-fixes).\n- usb: usbip: add missing device lock on tweak configuration cmd (git-fixes).\n- usb: usbip: fix a refcount leak in stub_probe() (git-fixes).\n- video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup (bsc#1129770)\n- vxlan: fix memleak of fdb (git-fixes).\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n- xhci: stop polling roothubs after shutdown (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-2629,SUSE-SLE-RT-12-SP5-2022-2629",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2629-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:2629-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222629-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:2629-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html"
},
{
"category": "self",
"summary": "SUSE Bug 1024718",
"url": "https://bugzilla.suse.com/1024718"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1158266",
"url": "https://bugzilla.suse.com/1158266"
},
{
"category": "self",
"summary": "SUSE Bug 1177282",
"url": "https://bugzilla.suse.com/1177282"
},
{
"category": "self",
"summary": "SUSE Bug 1188885",
"url": "https://bugzilla.suse.com/1188885"
},
{
"category": "self",
"summary": "SUSE Bug 1194013",
"url": "https://bugzilla.suse.com/1194013"
},
{
"category": "self",
"summary": "SUSE Bug 1194124",
"url": "https://bugzilla.suse.com/1194124"
},
{
"category": "self",
"summary": "SUSE Bug 1196426",
"url": "https://bugzilla.suse.com/1196426"
},
{
"category": "self",
"summary": "SUSE Bug 1196570",
"url": "https://bugzilla.suse.com/1196570"
},
{
"category": "self",
"summary": "SUSE Bug 1196901",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "self",
"summary": "SUSE Bug 1196964",
"url": "https://bugzilla.suse.com/1196964"
},
{
"category": "self",
"summary": "SUSE Bug 1197170",
"url": "https://bugzilla.suse.com/1197170"
},
{
"category": "self",
"summary": "SUSE Bug 1197219",
"url": "https://bugzilla.suse.com/1197219"
},
{
"category": "self",
"summary": "SUSE Bug 1197601",
"url": "https://bugzilla.suse.com/1197601"
},
{
"category": "self",
"summary": "SUSE Bug 1198438",
"url": "https://bugzilla.suse.com/1198438"
},
{
"category": "self",
"summary": "SUSE Bug 1198577",
"url": "https://bugzilla.suse.com/1198577"
},
{
"category": "self",
"summary": "SUSE Bug 1198866",
"url": "https://bugzilla.suse.com/1198866"
},
{
"category": "self",
"summary": "SUSE Bug 1198899",
"url": "https://bugzilla.suse.com/1198899"
},
{
"category": "self",
"summary": "SUSE Bug 1199035",
"url": "https://bugzilla.suse.com/1199035"
},
{
"category": "self",
"summary": "SUSE Bug 1199063",
"url": "https://bugzilla.suse.com/1199063"
},
{
"category": "self",
"summary": "SUSE Bug 1199237",
"url": "https://bugzilla.suse.com/1199237"
},
{
"category": "self",
"summary": "SUSE Bug 1199239",
"url": "https://bugzilla.suse.com/1199239"
},
{
"category": "self",
"summary": "SUSE Bug 1199314",
"url": "https://bugzilla.suse.com/1199314"
},
{
"category": "self",
"summary": "SUSE Bug 1199399",
"url": "https://bugzilla.suse.com/1199399"
},
{
"category": "self",
"summary": "SUSE Bug 1199426",
"url": "https://bugzilla.suse.com/1199426"
},
{
"category": "self",
"summary": "SUSE Bug 1199482",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "self",
"summary": "SUSE Bug 1199487",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "self",
"summary": "SUSE Bug 1199505",
"url": "https://bugzilla.suse.com/1199505"
},
{
"category": "self",
"summary": "SUSE Bug 1199507",
"url": "https://bugzilla.suse.com/1199507"
},
{
"category": "self",
"summary": "SUSE Bug 1199526",
"url": "https://bugzilla.suse.com/1199526"
},
{
"category": "self",
"summary": "SUSE Bug 1199605",
"url": "https://bugzilla.suse.com/1199605"
},
{
"category": "self",
"summary": "SUSE Bug 1199631",
"url": "https://bugzilla.suse.com/1199631"
},
{
"category": "self",
"summary": "SUSE Bug 1199650",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "self",
"summary": "SUSE Bug 1199657",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "self",
"summary": "SUSE Bug 1199671",
"url": "https://bugzilla.suse.com/1199671"
},
{
"category": "self",
"summary": "SUSE Bug 1199839",
"url": "https://bugzilla.suse.com/1199839"
},
{
"category": "self",
"summary": "SUSE Bug 1200015",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "self",
"summary": "SUSE Bug 1200045",
"url": "https://bugzilla.suse.com/1200045"
},
{
"category": "self",
"summary": "SUSE Bug 1200143",
"url": "https://bugzilla.suse.com/1200143"
},
{
"category": "self",
"summary": "SUSE Bug 1200144",
"url": "https://bugzilla.suse.com/1200144"
},
{
"category": "self",
"summary": "SUSE Bug 1200173",
"url": "https://bugzilla.suse.com/1200173"
},
{
"category": "self",
"summary": "SUSE Bug 1200249",
"url": "https://bugzilla.suse.com/1200249"
},
{
"category": "self",
"summary": "SUSE Bug 1200343",
"url": "https://bugzilla.suse.com/1200343"
},
{
"category": "self",
"summary": "SUSE Bug 1200549",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "self",
"summary": "SUSE Bug 1200571",
"url": "https://bugzilla.suse.com/1200571"
},
{
"category": "self",
"summary": "SUSE Bug 1200599",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "self",
"summary": "SUSE Bug 1200600",
"url": "https://bugzilla.suse.com/1200600"
},
{
"category": "self",
"summary": "SUSE Bug 1200604",
"url": "https://bugzilla.suse.com/1200604"
},
{
"category": "self",
"summary": "SUSE Bug 1200605",
"url": "https://bugzilla.suse.com/1200605"
},
{
"category": "self",
"summary": "SUSE Bug 1200608",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "self",
"summary": "SUSE Bug 1200619",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "self",
"summary": "SUSE Bug 1200762",
"url": "https://bugzilla.suse.com/1200762"
},
{
"category": "self",
"summary": "SUSE Bug 1200806",
"url": "https://bugzilla.suse.com/1200806"
},
{
"category": "self",
"summary": "SUSE Bug 1200807",
"url": "https://bugzilla.suse.com/1200807"
},
{
"category": "self",
"summary": "SUSE Bug 1200809",
"url": "https://bugzilla.suse.com/1200809"
},
{
"category": "self",
"summary": "SUSE Bug 1200810",
"url": "https://bugzilla.suse.com/1200810"
},
{
"category": "self",
"summary": "SUSE Bug 1200813",
"url": "https://bugzilla.suse.com/1200813"
},
{
"category": "self",
"summary": "SUSE Bug 1200820",
"url": "https://bugzilla.suse.com/1200820"
},
{
"category": "self",
"summary": "SUSE Bug 1200821",
"url": "https://bugzilla.suse.com/1200821"
},
{
"category": "self",
"summary": "SUSE Bug 1200822",
"url": "https://bugzilla.suse.com/1200822"
},
{
"category": "self",
"summary": "SUSE Bug 1200829",
"url": "https://bugzilla.suse.com/1200829"
},
{
"category": "self",
"summary": "SUSE Bug 1200868",
"url": "https://bugzilla.suse.com/1200868"
},
{
"category": "self",
"summary": "SUSE Bug 1200869",
"url": "https://bugzilla.suse.com/1200869"
},
{
"category": "self",
"summary": "SUSE Bug 1200870",
"url": "https://bugzilla.suse.com/1200870"
},
{
"category": "self",
"summary": "SUSE Bug 1200871",
"url": "https://bugzilla.suse.com/1200871"
},
{
"category": "self",
"summary": "SUSE Bug 1200872",
"url": "https://bugzilla.suse.com/1200872"
},
{
"category": "self",
"summary": "SUSE Bug 1200873",
"url": "https://bugzilla.suse.com/1200873"
},
{
"category": "self",
"summary": "SUSE Bug 1200925",
"url": "https://bugzilla.suse.com/1200925"
},
{
"category": "self",
"summary": "SUSE Bug 1201050",
"url": "https://bugzilla.suse.com/1201050"
},
{
"category": "self",
"summary": "SUSE Bug 1201080",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "self",
"summary": "SUSE Bug 1201251",
"url": "https://bugzilla.suse.com/1201251"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19377 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26541 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26341 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26341/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33061 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39711 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4157 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1012 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1184 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1184/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1652 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1652/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1679 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1729 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1734 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1734/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1836 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1966 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1974 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1975 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1975/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20132 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20141 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20154 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21123 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21125 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21127 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21166 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21180 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21499 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21499/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2318 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26365 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29900 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29901 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-30594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-30594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33740 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33741 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33742 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33742/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-08-02T13:58:57Z",
"generator": {
"date": "2022-08-02T13:58:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:2629-1",
"initial_release_date": "2022-08-02T13:58:57Z",
"revision_history": [
{
"date": "2022-08-02T13:58:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.12.14-10.94.1.noarch",
"product": {
"name": "kernel-devel-rt-4.12.14-10.94.1.noarch",
"product_id": "kernel-devel-rt-4.12.14-10.94.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.12.14-10.94.1.noarch",
"product": {
"name": "kernel-source-rt-4.12.14-10.94.1.noarch",
"product_id": "kernel-source-rt-4.12.14-10.94.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-4.12.14-10.94.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-4.12.14-10.94.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"product_id": "dlm-kmp-rt-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-4.12.14-10.94.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-4.12.14-10.94.1.x86_64",
"product_id": "dlm-kmp-rt_debug-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"product_id": "gfs2-kmp-rt-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-4.12.14-10.94.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-4.12.14-10.94.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.12.14-10.94.1.x86_64",
"product": {
"name": "kernel-rt-4.12.14-10.94.1.x86_64",
"product_id": "kernel-rt-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.12.14-10.94.1.x86_64",
"product": {
"name": "kernel-rt-base-4.12.14-10.94.1.x86_64",
"product_id": "kernel-rt-base-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.12.14-10.94.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.12.14-10.94.1.x86_64",
"product_id": "kernel-rt-devel-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-4.12.14-10.94.1.x86_64",
"product": {
"name": "kernel-rt-extra-4.12.14-10.94.1.x86_64",
"product_id": "kernel-rt-extra-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-kgraft-devel-4.12.14-10.94.1.x86_64",
"product": {
"name": "kernel-rt-kgraft-devel-4.12.14-10.94.1.x86_64",
"product_id": "kernel-rt-kgraft-devel-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-4.12.14-10.94.1.x86_64",
"product": {
"name": "kernel-rt_debug-4.12.14-10.94.1.x86_64",
"product_id": "kernel-rt_debug-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-base-4.12.14-10.94.1.x86_64",
"product": {
"name": "kernel-rt_debug-base-4.12.14-10.94.1.x86_64",
"product_id": "kernel-rt_debug-base-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-4.12.14-10.94.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-4.12.14-10.94.1.x86_64",
"product_id": "kernel-rt_debug-extra-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.94.1.x86_64",
"product": {
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.94.1.x86_64",
"product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.12.14-10.94.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.12.14-10.94.1.x86_64",
"product_id": "kernel-syms-rt-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-4.12.14-10.94.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-4.12.14-10.94.1.x86_64",
"product_id": "kselftests-kmp-rt-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-4.12.14-10.94.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-4.12.14-10.94.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-4.12.14-10.94.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-4.12.14-10.94.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-4.12.14-10.94.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.12.14-10.94.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.12.14-10.94.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.12.14-10.94.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.12.14-10.94.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch"
},
"product_reference": "kernel-devel-rt-4.12.14-10.94.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-10.94.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64"
},
"product_reference": "kernel-rt-4.12.14-10.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.12.14-10.94.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64"
},
"product_reference": "kernel-rt-base-4.12.14-10.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.12.14-10.94.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.12.14-10.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-4.12.14-10.94.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64"
},
"product_reference": "kernel-rt_debug-4.12.14-10.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.12.14-10.94.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.12.14-10.94.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch"
},
"product_reference": "kernel-source-rt-4.12.14-10.94.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.12.14-10.94.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.12.14-10.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.12.14-10.94.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-19377",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19377"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19377",
"url": "https://www.suse.com/security/cve/CVE-2019-19377"
},
{
"category": "external",
"summary": "SUSE Bug 1158266 for CVE-2019-19377",
"url": "https://bugzilla.suse.com/1158266"
},
{
"category": "external",
"summary": "SUSE Bug 1162338 for CVE-2019-19377",
"url": "https://bugzilla.suse.com/1162338"
},
{
"category": "external",
"summary": "SUSE Bug 1162369 for CVE-2019-19377",
"url": "https://bugzilla.suse.com/1162369"
},
{
"category": "external",
"summary": "SUSE Bug 1173871 for CVE-2019-19377",
"url": "https://bugzilla.suse.com/1173871"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2019-19377",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "important"
}
],
"title": "CVE-2019-19377"
},
{
"cve": "CVE-2020-26541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26541"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26541",
"url": "https://www.suse.com/security/cve/CVE-2020-26541"
},
{
"category": "external",
"summary": "SUSE Bug 1177282 for CVE-2020-26541",
"url": "https://bugzilla.suse.com/1177282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2020-26541"
},
{
"cve": "CVE-2021-26341",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26341"
}
],
"notes": [
{
"category": "general",
"text": "Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26341",
"url": "https://www.suse.com/security/cve/CVE-2021-26341"
},
{
"category": "external",
"summary": "SUSE Bug 1196901 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "external",
"summary": "SUSE Bug 1201050 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1201050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-33061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33061"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33061",
"url": "https://www.suse.com/security/cve/CVE-2021-33061"
},
{
"category": "external",
"summary": "SUSE Bug 1196426 for CVE-2021-33061",
"url": "https://bugzilla.suse.com/1196426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2021-33061"
},
{
"cve": "CVE-2021-39711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39711"
}
],
"notes": [
{
"category": "general",
"text": "In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39711",
"url": "https://www.suse.com/security/cve/CVE-2021-39711"
},
{
"category": "external",
"summary": "SUSE Bug 1197219 for CVE-2021-39711",
"url": "https://bugzilla.suse.com/1197219"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2021-39711"
},
{
"cve": "CVE-2021-4157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4157"
}
],
"notes": [
{
"category": "general",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4157",
"url": "https://www.suse.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "SUSE Bug 1194013 for CVE-2021-4157",
"url": "https://bugzilla.suse.com/1194013"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "low"
}
],
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2022-1012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1012"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1012",
"url": "https://www.suse.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "SUSE Bug 1199482 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "external",
"summary": "SUSE Bug 1199694 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199694"
},
{
"category": "external",
"summary": "SUSE Bug 1202335 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1202335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-1184",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1184"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u0027s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1184",
"url": "https://www.suse.com/security/cve/CVE-2022-1184"
},
{
"category": "external",
"summary": "SUSE Bug 1198577 for CVE-2022-1184",
"url": "https://bugzilla.suse.com/1198577"
},
{
"category": "external",
"summary": "SUSE Bug 1210859 for CVE-2022-1184",
"url": "https://bugzilla.suse.com/1210859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1652",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1652"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1652",
"url": "https://www.suse.com/security/cve/CVE-2022-1652"
},
{
"category": "external",
"summary": "SUSE Bug 1199063 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1199063"
},
{
"category": "external",
"summary": "SUSE Bug 1200057 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1200057"
},
{
"category": "external",
"summary": "SUSE Bug 1200751 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1200751"
},
{
"category": "external",
"summary": "SUSE Bug 1201034 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1201034"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212307 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1212307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-1652"
},
{
"cve": "CVE-2022-1679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1679"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1679",
"url": "https://www.suse.com/security/cve/CVE-2022-1679"
},
{
"category": "external",
"summary": "SUSE Bug 1199487 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "external",
"summary": "SUSE Bug 1201080 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212316 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1212316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1729"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1729",
"url": "https://www.suse.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "SUSE Bug 1199507 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199507"
},
{
"category": "external",
"summary": "SUSE Bug 1199697 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199697"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1201832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "important"
}
],
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1734",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1734"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1734",
"url": "https://www.suse.com/security/cve/CVE-2022-1734"
},
{
"category": "external",
"summary": "SUSE Bug 1199605 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1199605"
},
{
"category": "external",
"summary": "SUSE Bug 1199606 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1199606"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1201832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "important"
}
],
"title": "CVE-2022-1734"
},
{
"cve": "CVE-2022-1836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1836"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-33981. Reason: This candidate is a reservation duplicate of CVE-2022-33981. Notes: All CVE users should reference CVE-2022-33981 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1836",
"url": "https://www.suse.com/security/cve/CVE-2022-1836"
},
{
"category": "external",
"summary": "SUSE Bug 1198866 for CVE-2022-1836",
"url": "https://bugzilla.suse.com/1198866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-1836"
},
{
"cve": "CVE-2022-1966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1966"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1966",
"url": "https://www.suse.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "SUSE Bug 1200015 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "external",
"summary": "SUSE Bug 1200268 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200268"
},
{
"category": "external",
"summary": "SUSE Bug 1200494 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200494"
},
{
"category": "external",
"summary": "SUSE Bug 1200529 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "important"
}
],
"title": "CVE-2022-1966"
},
{
"cve": "CVE-2022-1974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1974"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1974",
"url": "https://www.suse.com/security/cve/CVE-2022-1974"
},
{
"category": "external",
"summary": "SUSE Bug 1200144 for CVE-2022-1974",
"url": "https://bugzilla.suse.com/1200144"
},
{
"category": "external",
"summary": "SUSE Bug 1200265 for CVE-2022-1974",
"url": "https://bugzilla.suse.com/1200265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-1974"
},
{
"cve": "CVE-2022-1975",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1975"
}
],
"notes": [
{
"category": "general",
"text": "There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1975",
"url": "https://www.suse.com/security/cve/CVE-2022-1975"
},
{
"category": "external",
"summary": "SUSE Bug 1200143 for CVE-2022-1975",
"url": "https://bugzilla.suse.com/1200143"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-1975"
},
{
"cve": "CVE-2022-20132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20132"
}
],
"notes": [
{
"category": "general",
"text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20132",
"url": "https://www.suse.com/security/cve/CVE-2022-20132"
},
{
"category": "external",
"summary": "SUSE Bug 1200619 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "external",
"summary": "SUSE Bug 1212287 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1212287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20141"
}
],
"notes": [
{
"category": "general",
"text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20141",
"url": "https://www.suse.com/security/cve/CVE-2022-20141"
},
{
"category": "external",
"summary": "SUSE Bug 1200604 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1200604"
},
{
"category": "external",
"summary": "SUSE Bug 1200605 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1200605"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1203034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-20154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20154"
}
],
"notes": [
{
"category": "general",
"text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20154",
"url": "https://www.suse.com/security/cve/CVE-2022-20154"
},
{
"category": "external",
"summary": "SUSE Bug 1200599 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "external",
"summary": "SUSE Bug 1200608 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-21123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21123"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21123",
"url": "https://www.suse.com/security/cve/CVE-2022-21123"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209075 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1209075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-21125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21125"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21125",
"url": "https://www.suse.com/security/cve/CVE-2022-21125"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209074 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1209074"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21127"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21127",
"url": "https://www.suse.com/security/cve/CVE-2022-21127"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21127",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21127",
"url": "https://bugzilla.suse.com/1200549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-21127"
},
{
"cve": "CVE-2022-21166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21166"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21166",
"url": "https://www.suse.com/security/cve/CVE-2022-21166"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209073 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1209073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21180"
}
],
"notes": [
{
"category": "general",
"text": "Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21180",
"url": "https://www.suse.com/security/cve/CVE-2022-21180"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1212313 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1212313"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-21180"
},
{
"cve": "CVE-2022-21499",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21499"
}
],
"notes": [
{
"category": "general",
"text": "KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21499",
"url": "https://www.suse.com/security/cve/CVE-2022-21499"
},
{
"category": "external",
"summary": "SUSE Bug 1199426 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1199426"
},
{
"category": "external",
"summary": "SUSE Bug 1200059 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1200059"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1203034"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212315 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1212315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "important"
}
],
"title": "CVE-2022-21499"
},
{
"cve": "CVE-2022-2318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2318"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2318",
"url": "https://www.suse.com/security/cve/CVE-2022-2318"
},
{
"category": "external",
"summary": "SUSE Bug 1201251 for CVE-2022-2318",
"url": "https://bugzilla.suse.com/1201251"
},
{
"category": "external",
"summary": "SUSE Bug 1212303 for CVE-2022-2318",
"url": "https://bugzilla.suse.com/1212303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-2318"
},
{
"cve": "CVE-2022-26365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26365"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26365",
"url": "https://www.suse.com/security/cve/CVE-2022-26365"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-26365",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-26365"
},
{
"cve": "CVE-2022-29900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29900"
}
],
"notes": [
{
"category": "general",
"text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29900",
"url": "https://www.suse.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29901"
}
],
"notes": [
{
"category": "general",
"text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29901",
"url": "https://www.suse.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-30594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-30594"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-30594",
"url": "https://www.suse.com/security/cve/CVE-2022-30594"
},
{
"category": "external",
"summary": "SUSE Bug 1199505 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1199505"
},
{
"category": "external",
"summary": "SUSE Bug 1199602 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1199602"
},
{
"category": "external",
"summary": "SUSE Bug 1201549 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1201549"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1204132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "important"
}
],
"title": "CVE-2022-30594"
},
{
"cve": "CVE-2022-33740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33740"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33740",
"url": "https://www.suse.com/security/cve/CVE-2022-33740"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-33740",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-33740"
},
{
"cve": "CVE-2022-33741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33741"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33741",
"url": "https://www.suse.com/security/cve/CVE-2022-33741"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-33741",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-33741"
},
{
"cve": "CVE-2022-33742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33742"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33742",
"url": "https://www.suse.com/security/cve/CVE-2022-33742"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-33742",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.94.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.94.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.94.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-08-02T13:58:57Z",
"details": "moderate"
}
],
"title": "CVE-2022-33742"
}
]
}
suse-su-2022:2424-2
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 RT kernel was updated to 3.12.31 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).\n- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).\n- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)\n- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n\nThe following non-security bugs were fixed:\n\n- Add missing recommends of kernel-install-tools to kernel-source-vanilla (bsc#1200442)\n- Add various fsctl structs (bsc#1200217).\n- ALSA: hda/conexant: Fix missing beep setup (git-fixes).\n- ALSA: hda/realtek - Add HW8326 support (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).\n- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).\n- ALSA: hda/via: Fix missing beep setup (git-fixes).\n- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes)\n- arm64: ftrace: fix branch range checks (git-fixes)\n- ASoC: cs35l36: Update digital volume TLV (git-fixes).\n- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).\n- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).\n- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).\n- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).\n- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).\n- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).\n- ASoC: wm8962: Fix suspend while playing music (git-fixes).\n- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).\n- ata: libata: add qc-\u003eflags in ata_qc_complete_template tracepoint (git-fixes).\n- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).\n- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).\n- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).\n- bcache: fixup multiple threads crash (git-fixes).\n- bcache: improve multithreaded bch_btree_check() (git-fixes).\n- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).\n- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).\n- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).\n- bio: fix page leak bio_add_hw_page failure (git-fixes).\n- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).\n- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).\n- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).\n- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).\n- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762)\n- blk-mq: update hctx-\u003edispatch_busy in case of real scheduler (git-fixes).\n- block: advance iov_iter on bio_add_hw_page failure (git-fixes).\n- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).\n- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).\n- block: Fix kABI in blk-merge.c (bsc#1198020).\n- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).\n- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).\n- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).\n- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).\n- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).\n- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).\n- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).\n- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).\n- cifs: avoid parallel session setups on same channel (bsc#1200217).\n- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).\n- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).\n- cifs: call helper functions for marking channels for reconnect (bsc#1200217).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).\n- cifs: check for smb1 in open_cached_dir() (bsc#1200217).\n- cifs: check reconnects for channels of active tcons too (bsc#1200217).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).\n- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).\n- cifs: clean up an inconsistent indenting (bsc#1200217).\n- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).\n- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).\n- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).\n- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).\n- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).\n- cifs: fix handlecache and multiuser (bsc#1200217).\n- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).\n- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).\n- cifs: fix minor compile warning (bsc#1200217).\n- cifs: fix missed refcounting of ipc tcon (bsc#1200217).\n- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).\n- cifs: fix potential deadlock in direct reclaim (bsc#1200217).\n- cifs: fix potential double free during failed mount (bsc#1200217).\n- cifs: fix potential race with cifsd thread (bsc#1200217).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).\n- cifs: fix the connection state transitions with multichannel (bsc#1200217).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).\n- cifs: fix workstation_name for multiuser mounts (bsc#1200217).\n- cifs: force new session setup and tcon for dfs (bsc#1200217).\n- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).\n- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).\n- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).\n- cifs: make status checks in version independent callers (bsc#1200217).\n- cifs: mark sessions for reconnection in helper function (bsc#1200217).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).\n- cifs: move superblock magic defitions to magic.h (bsc#1200217).\n- cifs: potential buffer overflow in handling symlinks (bsc#1200217).\n- cifs: print TIDs as hex (bsc#1200217).\n- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).\n- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).\n- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).\n- cifs: release cached dentries only if mount is complete (bsc#1200217).\n- cifs: remove check of list iterator against head past the loop body (bsc#1200217).\n- cifs: remove redundant assignment to pointer p (bsc#1200217).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).\n- cifs: remove repeated state change in dfs tree connect (bsc#1200217).\n- cifs: remove unused variable ses_selected (bsc#1200217).\n- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).\n- cifs: return the more nuanced writeback error on close() (bsc#1200217).\n- cifs: sanitize multiple delimiters in prepath (bsc#1200217).\n- cifs: serialize all mount attempts (bsc#1200217).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).\n- cifs: skip trailing separators of prefix paths (bsc#1200217).\n- cifs: smbd: fix typo in comment (bsc#1200217).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).\n- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).\n- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).\n- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).\n- cifs: update internal module number (bsc#1193629).\n- cifs: update internal module number (bsc#1200217).\n- cifs: update internal module number (bsc#1200217).\n- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).\n- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).\n- cifs: use new enum for ses_status (bsc#1200217).\n- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).\n- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).\n- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).\n- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).\n- drm/i915: Update TGL and RKL DMC firmware versions (bsc#1198924).\n- drm/msm: Fix double pm_runtime_disable() call (git-fixes).\n- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).\n- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- Fix a warning about a malformed kernel doc comment in cifs (bsc#1200217).\n- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).\n- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).\n- gtp: use icmp_ndo_send helper (git-fixes).\n- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).\n- i2c: designware: Use standard optional ref clock implementation (git-fixes).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).\n- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).\n- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).\n- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).\n- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).\n- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).\n- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).\n- jfs: fix divide error in dbNextAG (bsc#1200828).\n- kABI fix of sysctl_run_estimation (git-fixes).\n- kabi: nvme workaround header include (bsc#1201193).\n- kabi/severities: ignore KABI for NVMe target (bsc#1192761)\n- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).\n- md: fix update super 1.0 on rdev size change (git-fixes).\n- move devm_allocate to end of structure for kABI (git-fixes).\n- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).\n- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: ieee802154: ca8210: Stop leaking skb\u0027s (git-fixes).\n- net: lantiq: Add locking for TX DMA channel (git-fixes).\n- net: rose: fix UAF bugs caused by timer handler (git-fixes).\n- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).\n- net: usb: ax88179_178a: Fix packet receiving (git-fixes).\n- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).\n- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).\n- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).\n- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).\n- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).\n- NFS: Do not report flush errors in nfs_write_end() (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- NFS: Memory allocation failures are not server fatal errors (git-fixes).\n- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).\n- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).\n- nvdimm/region: Fix default alignment for small regions (git-fixes).\n- nvme: add CNTRLTYPE definitions for \u0027identify controller\u0027 (bsc#1192761).\n- nvme: Add connect option \u0027discovery\u0027 (bsc#1192761).\n- nvme: add new discovery log page entry definitions (bsc#1192761).\n- nvme: display correct subsystem NQN (bsc#1192761).\n- nvme: expose subsystem type in sysfs attribute \u0027subsystype\u0027 (bsc#1192761).\n- nvme: kabi fix nvme subsystype change (bsc#1192761)\n- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).\n- nvmet: add nvmet_req_subsys() helper (bsc#1192761).\n- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).\n- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).\n- nvmet: fix freeing unallocated p2pmem (git-fixes).\n- nvmet: make discovery NQN configurable (bsc#1192761).\n- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).\n- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).\n- nvmet: register discovery subsystem as \u0027current\u0027 (bsc#1192761).\n- nvmet: set \u0027CNTRLTYPE\u0027 in the identify controller data (bsc#1192761).\n- nvmet: switch check for subsystem type (bsc#1192761).\n- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config\n- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).\n- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- random: Add and use pr_fmt() (bsc#1184924).\n- random: remove unnecessary unlikely() (bsc#1184924).\n- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).\n- Revert \u0027block: Fix a lockdep complaint triggered by request queue flushing\u0027 (git-fixes).\n- rpm/check-for-config-changes: ignore GCC12/CC_NO_ARRAY_BOUNDS\n- rpm/kernel-obs-build.spec.in: add systemd-initrd and terminfo dracut module (bsc#1195775)\n- rpm/kernel-obs-build.spec.in: Also depend on dracut-systemd (bsc#1195775)\n- scsi: core: Show SCMD_LAST in text form (git-fixes).\n- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).\n- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).\n- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).\n- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).\n- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).\n- scsi: lpfc: Commonize VMID code location (bsc#1201193).\n- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).\n- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).\n- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).\n- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).\n- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).\n- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).\n- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).\n- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).\n- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).\n- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).\n- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).\n- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).\n- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).\n- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).\n- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).\n- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).\n- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).\n- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).\n- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).\n- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).\n- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).\n- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).\n- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).\n- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).\n- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).\n- scsi: qla2xxx: Remove setting of \u0027req\u0027 and \u0027rsp\u0027 parameters (bsc#1201160).\n- scsi: qla2xxx: Remove unused \u0027ql_dm_tgt_ex_pct\u0027 parameter (bsc#1201160).\n- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).\n- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).\n- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).\n- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).\n- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).\n- scsi: sd: Signal drive managed SMR disks (git-fixes).\n- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).\n- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).\n- scsi: sd_zbc: Improve zone revalidation (git-fixes).\n- scsi: sd_zbc: Remove unused inline functions (git-fixes).\n- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).\n- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).\n- smb3: add mount parm nosparse (bsc#1200217).\n- smb3: add trace point for lease not found issue (bsc#1200217).\n- smb3: add trace point for oplock not found (bsc#1200217).\n- smb3: check for null tcon (bsc#1200217).\n- smb3: cleanup and clarify status of tree connections (bsc#1200217).\n- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).\n- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).\n- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).\n- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- smb3: fix snapshot mount option (bsc#1200217).\n- [smb3] improve error message when mount options conflict with posix (bsc#1200217).\n- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- [smb3] move more common protocol header definitions to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- smb3: send NTLMSSP version information (bsc#1200217).\n- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).\n- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- sunvnet: use icmp_ndo_send helper (git-fixes).\n- tty: goldfish: Fix free_irq() on remove (git-fixes).\n- usb: chipidea: udc: check request status before setting device address (git-fixes).\n- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).\n- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).\n- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).\n- usbnet: fix memory allocation in helpers (git-fixes).\n- USB: serial: io_ti: add Agilent E5805A support (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support (git-fixes).\n- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).\n- veth: fix races around rq-\u003erx_notify_masked (git-fixes).\n- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).\n- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).\n- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).\n- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).\n- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-2424,openSUSE-Leap-Micro-5.2-2022-2424",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2424-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:2424-2",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222424-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:2424-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1179195",
"url": "https://bugzilla.suse.com/1179195"
},
{
"category": "self",
"summary": "SUSE Bug 1180814",
"url": "https://bugzilla.suse.com/1180814"
},
{
"category": "self",
"summary": "SUSE Bug 1184924",
"url": "https://bugzilla.suse.com/1184924"
},
{
"category": "self",
"summary": "SUSE Bug 1185762",
"url": "https://bugzilla.suse.com/1185762"
},
{
"category": "self",
"summary": "SUSE Bug 1192761",
"url": "https://bugzilla.suse.com/1192761"
},
{
"category": "self",
"summary": "SUSE Bug 1193629",
"url": "https://bugzilla.suse.com/1193629"
},
{
"category": "self",
"summary": "SUSE Bug 1194013",
"url": "https://bugzilla.suse.com/1194013"
},
{
"category": "self",
"summary": "SUSE Bug 1195504",
"url": "https://bugzilla.suse.com/1195504"
},
{
"category": "self",
"summary": "SUSE Bug 1195775",
"url": "https://bugzilla.suse.com/1195775"
},
{
"category": "self",
"summary": "SUSE Bug 1196901",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "self",
"summary": "SUSE Bug 1197362",
"url": "https://bugzilla.suse.com/1197362"
},
{
"category": "self",
"summary": "SUSE Bug 1197754",
"url": "https://bugzilla.suse.com/1197754"
},
{
"category": "self",
"summary": "SUSE Bug 1198020",
"url": "https://bugzilla.suse.com/1198020"
},
{
"category": "self",
"summary": "SUSE Bug 1198924",
"url": "https://bugzilla.suse.com/1198924"
},
{
"category": "self",
"summary": "SUSE Bug 1199482",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "self",
"summary": "SUSE Bug 1199487",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "self",
"summary": "SUSE Bug 1199489",
"url": "https://bugzilla.suse.com/1199489"
},
{
"category": "self",
"summary": "SUSE Bug 1199657",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "self",
"summary": "SUSE Bug 1200217",
"url": "https://bugzilla.suse.com/1200217"
},
{
"category": "self",
"summary": "SUSE Bug 1200263",
"url": "https://bugzilla.suse.com/1200263"
},
{
"category": "self",
"summary": "SUSE Bug 1200343",
"url": "https://bugzilla.suse.com/1200343"
},
{
"category": "self",
"summary": "SUSE Bug 1200442",
"url": "https://bugzilla.suse.com/1200442"
},
{
"category": "self",
"summary": "SUSE Bug 1200571",
"url": "https://bugzilla.suse.com/1200571"
},
{
"category": "self",
"summary": "SUSE Bug 1200599",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "self",
"summary": "SUSE Bug 1200600",
"url": "https://bugzilla.suse.com/1200600"
},
{
"category": "self",
"summary": "SUSE Bug 1200608",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "self",
"summary": "SUSE Bug 1200619",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "self",
"summary": "SUSE Bug 1200622",
"url": "https://bugzilla.suse.com/1200622"
},
{
"category": "self",
"summary": "SUSE Bug 1200692",
"url": "https://bugzilla.suse.com/1200692"
},
{
"category": "self",
"summary": "SUSE Bug 1200806",
"url": "https://bugzilla.suse.com/1200806"
},
{
"category": "self",
"summary": "SUSE Bug 1200807",
"url": "https://bugzilla.suse.com/1200807"
},
{
"category": "self",
"summary": "SUSE Bug 1200809",
"url": "https://bugzilla.suse.com/1200809"
},
{
"category": "self",
"summary": "SUSE Bug 1200810",
"url": "https://bugzilla.suse.com/1200810"
},
{
"category": "self",
"summary": "SUSE Bug 1200813",
"url": "https://bugzilla.suse.com/1200813"
},
{
"category": "self",
"summary": "SUSE Bug 1200816",
"url": "https://bugzilla.suse.com/1200816"
},
{
"category": "self",
"summary": "SUSE Bug 1200820",
"url": "https://bugzilla.suse.com/1200820"
},
{
"category": "self",
"summary": "SUSE Bug 1200821",
"url": "https://bugzilla.suse.com/1200821"
},
{
"category": "self",
"summary": "SUSE Bug 1200822",
"url": "https://bugzilla.suse.com/1200822"
},
{
"category": "self",
"summary": "SUSE Bug 1200825",
"url": "https://bugzilla.suse.com/1200825"
},
{
"category": "self",
"summary": "SUSE Bug 1200828",
"url": "https://bugzilla.suse.com/1200828"
},
{
"category": "self",
"summary": "SUSE Bug 1200829",
"url": "https://bugzilla.suse.com/1200829"
},
{
"category": "self",
"summary": "SUSE Bug 1200925",
"url": "https://bugzilla.suse.com/1200925"
},
{
"category": "self",
"summary": "SUSE Bug 1201050",
"url": "https://bugzilla.suse.com/1201050"
},
{
"category": "self",
"summary": "SUSE Bug 1201080",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "self",
"summary": "SUSE Bug 1201143",
"url": "https://bugzilla.suse.com/1201143"
},
{
"category": "self",
"summary": "SUSE Bug 1201147",
"url": "https://bugzilla.suse.com/1201147"
},
{
"category": "self",
"summary": "SUSE Bug 1201149",
"url": "https://bugzilla.suse.com/1201149"
},
{
"category": "self",
"summary": "SUSE Bug 1201160",
"url": "https://bugzilla.suse.com/1201160"
},
{
"category": "self",
"summary": "SUSE Bug 1201171",
"url": "https://bugzilla.suse.com/1201171"
},
{
"category": "self",
"summary": "SUSE Bug 1201177",
"url": "https://bugzilla.suse.com/1201177"
},
{
"category": "self",
"summary": "SUSE Bug 1201193",
"url": "https://bugzilla.suse.com/1201193"
},
{
"category": "self",
"summary": "SUSE Bug 1201222",
"url": "https://bugzilla.suse.com/1201222"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26341 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26341/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4157 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1012 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1679 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20132 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20154 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29900 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29901 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33981 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-34918 page",
"url": "https://www.suse.com/security/cve/CVE-2022-34918/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-07-18T06:45:44Z",
"generator": {
"date": "2022-07-18T06:45:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:2424-2",
"initial_release_date": "2022-07-18T06:45:44Z",
"revision_history": [
{
"date": "2022-07-18T06:45:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-150300.96.1.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-150300.96.1.noarch",
"product_id": "kernel-devel-rt-5.3.18-150300.96.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-150300.96.1.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-150300.96.1.noarch",
"product_id": "kernel-source-rt-5.3.18-150300.96.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt-devel-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt-extra-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt-optional-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt-optional-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt_debug-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-optional-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt_debug-optional-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt_debug-optional-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-syms-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-150300.96.1.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-150300.96.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.96.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-150300.96.1.x86_64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-150300.96.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-26341",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26341"
}
],
"notes": [
{
"category": "general",
"text": "Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26341",
"url": "https://www.suse.com/security/cve/CVE-2021-26341"
},
{
"category": "external",
"summary": "SUSE Bug 1196901 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "external",
"summary": "SUSE Bug 1201050 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1201050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-4157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4157"
}
],
"notes": [
{
"category": "general",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4157",
"url": "https://www.suse.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "SUSE Bug 1194013 for CVE-2021-4157",
"url": "https://bugzilla.suse.com/1194013"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:44Z",
"details": "low"
}
],
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2022-1012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1012"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1012",
"url": "https://www.suse.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "SUSE Bug 1199482 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "external",
"summary": "SUSE Bug 1199694 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199694"
},
{
"category": "external",
"summary": "SUSE Bug 1202335 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1202335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:44Z",
"details": "moderate"
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-1679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1679"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1679",
"url": "https://www.suse.com/security/cve/CVE-2022-1679"
},
{
"category": "external",
"summary": "SUSE Bug 1199487 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "external",
"summary": "SUSE Bug 1201080 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212316 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1212316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:44Z",
"details": "moderate"
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-20132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20132"
}
],
"notes": [
{
"category": "general",
"text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20132",
"url": "https://www.suse.com/security/cve/CVE-2022-20132"
},
{
"category": "external",
"summary": "SUSE Bug 1200619 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "external",
"summary": "SUSE Bug 1212287 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1212287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:44Z",
"details": "moderate"
}
],
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20154"
}
],
"notes": [
{
"category": "general",
"text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20154",
"url": "https://www.suse.com/security/cve/CVE-2022-20154"
},
{
"category": "external",
"summary": "SUSE Bug 1200599 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "external",
"summary": "SUSE Bug 1200608 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:44Z",
"details": "moderate"
}
],
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-29900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29900"
}
],
"notes": [
{
"category": "general",
"text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29900",
"url": "https://www.suse.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:44Z",
"details": "moderate"
}
],
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29901"
}
],
"notes": [
{
"category": "general",
"text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29901",
"url": "https://www.suse.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:44Z",
"details": "moderate"
}
],
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-33981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33981"
}
],
"notes": [
{
"category": "general",
"text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33981",
"url": "https://www.suse.com/security/cve/CVE-2022-33981"
},
{
"category": "external",
"summary": "SUSE Bug 1200692 for CVE-2022-33981",
"url": "https://bugzilla.suse.com/1200692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:44Z",
"details": "moderate"
}
],
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-34918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-34918"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-34918",
"url": "https://www.suse.com/security/cve/CVE-2022-34918"
},
{
"category": "external",
"summary": "SUSE Bug 1201171 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201171"
},
{
"category": "external",
"summary": "SUSE Bug 1201177 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201177"
},
{
"category": "external",
"summary": "SUSE Bug 1201222 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:44Z",
"details": "important"
}
],
"title": "CVE-2022-34918"
}
]
}
suse-su-2022:2172-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP3 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-1012: Fixed a small table perturb size in the TCP source port generation algorithm which could leads to information leak. (bsc#1199482).\n- CVE-2022-20141: Fixed an use after free due to improper locking. This bug could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. (bnc#1200604)\n- CVE-2022-32250: Fixed an use-after-free bug in the netfilter subsystem. This flaw allowed a local attacker with user access to cause a privilege escalation issue. (bnc#1200015)\n- CVE-2022-1975: Fixed a sleep-in-atomic bug that allows attacker to crash linux kernel by simulating nfc device from user-space. (bsc#1200143)\n- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)\n- CVE-2020-26541: Enforce the secure boot forbidden signature database (aka dbx) protection mechanism. (bnc#1177282)\n\nThe following non-security bugs were fixed:\n\n- ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default (git-fixes).\n- ACPI: sysfs: Fix BERT error region memory mapping (git-fixes).\n- ACPI: sysfs: Make sparse happy about address space in use (git-fixes).\n- ALSA: hda/conexant - Fix loopback issue with CX20632 (git-fixes).\n- ALSA: usb-audio: Optimize TEAC clock quirk (git-fixes).\n- ALSA: usb-audio: Set up (implicit) sync for Saffire 6 (git-fixes).\n- ALSA: usb-audio: Skip generic sync EP parse for secondary EP (git-fixes).\n- ALSA: usb-audio: Workaround for clock setup on TEAC devices (git-fixes).\n- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes)\n- ASoC: dapm: Do not fold register value changes into notifications (git-fixes).\n- ASoC: max98357a: remove dependency on GPIOLIB (git-fixes).\n- ASoC: rt5645: Fix errorenous cleanup order (git-fixes).\n- ASoC: tscs454: Add endianness flag in snd_soc_component_driver (git-fixes).\n- ata: libata-transport: fix {dma|pio|xfer}_mode sysfs files (git-fixes).\n- ath9k: fix QCA9561 PA bias level (git-fixes).\n- b43: Fix assigning negative value to unsigned variable (git-fixes).\n- b43legacy: Fix assigning negative value to unsigned variable (git-fixes).\n- blk-mq: fix tag_get wait task can\u0027t be awakened (bsc#1200263).\n- blk-mq: Fix wrong wakeup batch configuration which will cause hang (bsc#1200263).\n- block: fix bio_clone_blkg_association() to associate with proper blkcg_gq (bsc#1200259).\n- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).\n- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).\n- cfg80211: set custom regdomain after wiphy registration (git-fixes).\n- clocksource/drivers/oxnas-rps: Fix irq_of_parse_and_map() return value (git-fixes).\n- clocksource/drivers/sp804: Avoid error on multiple instances (git-fixes).\n- dma-buf: fix use of DMA_BUF_SET_NAME_{A,B} in userspace (git-fixes).\n- dmaengine: zynqmp_dma: In struct zynqmp_dma_chan fix desc_size data type (git-fixes).\n- drivers: i2c: thunderx: Allow driver to work with ACPI defined TWSI controllers (git-fixes).\n- drivers: staging: rtl8192e: Fix deadlock in rtllib_beacons_stop() (git-fixes).\n- drivers: staging: rtl8192u: Fix deadlock in ieee80211_beacons_stop() (git-fixes).\n- drivers: tty: serial: Fix deadlock in sa1100_set_termios() (git-fixes).\n- drivers: usb: host: Fix deadlock in oxu_bus_suspend() (git-fixes).\n- drm: imx: fix compiler warning with gcc-12 (git-fixes).\n- drm: msm: fix error check return value of irq_of_parse_and_map() (git-fixes).\n- drm/amdgpu/cs: make commands with 0 chunks illegal behaviour (git-fixes).\n- drm/amdgpu/smu10: fix SoC/fclk units in auto mode (git-fixes).\n- drm/amdgpu/ucode: Remove firmware load type check in amdgpu_ucode_free_bo (git-fixes).\n- drm/atomic: Force bridge self-refresh-exit on CRTC switch (git-fixes).\n- drm/bridge: analogix_dp: Support PSR-exit to disable transition (git-fixes).\n- drm/i915: Fix -Wstringop-overflow warning in call to intel_read_wm_latency() (git-fixes).\n- drm/i915: fix i915_globals_exit() section mismatch error (git-fixes).\n- drm/i915: Update TGL and RKL DMC firmware versions (bsc#1198924).\n- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).\n- drm/komeda: return early if drm_universal_plane_init() fails (git-fixes).\n- drm/msm/dsi: fix address for second DSI PHY on SDM660 (git-fixes).\n- drm/plane: Move range check for format_count earlier (git-fixes).\n- drm/radeon: fix a possible null pointer dereference (git-fixes).\n- drm/virtio: fix NULL pointer dereference in virtio_gpu_conn_get_modes (git-fixes).\n- efi: Add missing prototype for efi_capsule_setup_info (git-fixes).\n- efi: Do not import certificates from UEFI Secure Boot for T2 Macs (git-fixes).\n- fbcon: Consistently protect deferred_takeover with console_lock() (git-fixes).\n- ftrace: Clean up hash direct_functions on register failures (git-fixes).\n- HID: bigben: fix slab-out-of-bounds Write in bigben_probe (git-fixes).\n- HID: multitouch: Add support for Google Whiskers Touchpad (git-fixes).\n- hwmon: Make chip parameter for with_info API mandatory (git-fixes).\n- i2c: cadence: Increase timeout per message if necessary (git-fixes).\n- i2c: ismt: Provide a DMA buffer for Interrupt Cause Logging (git-fixes).\n- iio: dummy: iio_simple_dummy: check the return value of kstrdup() (git-fixes).\n- Input: bcm5974 - set missing URB_NO_TRANSFER_DMA_MAP urb flag (git-fixes).\n- Input: goodix - fix spurious key release events (git-fixes).\n- ipw2x00: Fix potential NULL dereference in libipw_xmit() (git-fixes).\n- irqchip: irq-xtensa-mx: fix initial IRQ affinity (git-fixes).\n- irqchip/armada-370-xp: Do not touch Performance Counter Overflow on A375, A38x, A39x (git-fixes).\n- irqchip/aspeed-i2c-ic: Fix irq_of_parse_and_map() return value (git-fixes).\n- irqchip/exiu: Fix acknowledgment of edge triggered interrupts (git-fixes).\n- iwlwifi: mvm: fix assert 1F04 upon reconfig (git-fixes).\n- KVM: fix wrong exception emulation in check_rdtsc (git-fixes).\n- KVM: nVMX: Invalidate all roots when emulating INVVPID without EPT (git-fixes).\n- KVM: nVMX: Query current VMCS when determining if MSR bitmaps are in use (git-fixes).\n- KVM: nVMX: Set LDTR to its architecturally defined value on nested VM-Exit (git-fixes).\n- KVM: nVMX: Unconditionally clear nested.pi_pending on nested VM-Enter (git-fixes).\n- KVM: s390: pv: add macros for UVC CC values (git-fixes).\n- KVM: s390: pv: avoid double free of sida page (git-fixes).\n- KVM: s390: pv: avoid stalls for kvm_s390_pv_init_vm (git-fixes).\n- KVM: s390: vsie/gmap: reduce gmap_rmap overhead (git-fixes).\n- KVM: VMX: Flush all EPTP/VPID contexts on remote TLB flush (git-fixes).\n- KVM: VMX: Use current VMCS to query WAITPKG support for MSR emulation (git-fixes).\n- KVM: x86: clflushopt should be treated as a no-op by emulation (git-fixes).\n- KVM: x86: Do not force set BSP bit when local APIC is managed by userspace (git-fixes).\n- KVM: x86: Fix emulation in writing cr8 (git-fixes).\n- KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce (git-fixes).\n- KVM: x86: Immediately reset the MMU context when the SMM flag is cleared (git-fixes).\n- KVM: x86: Inject #GP if guest attempts to toggle CR4.LA57 in 64-bit mode (git-fixes).\n- KVM: x86: Mark CR4.TSD as being possibly owned by the guest (git-fixes).\n- KVM: x86: Migrate the PIT only if vcpu0 is migrated, not any BSP (git-fixes).\n- KVM: x86: Toggling CR4.PKE does not load PDPTEs in PAE mode (git-fixes).\n- KVM: x86: Toggling CR4.SMAP does not load PDPTEs in PAE mode (git-fixes).\n- KVM: x86/cpuid: Only provide CPUID leaf 0xA if host has architectural PMU (git-fixes).\n- KVM: x86/emulator: Defer not-present segment check in __load_segment_descriptor() (git-fixes).\n- KVM: x86/pmu: Fix HW_REF_CPU_CYCLES event pseudo-encoding in intel_arch_events[] (git-fixes).\n- mac80211: upgrade passive scan to active scan on DFS channels after beacon rx (git-fixes).\n- md: fix an incorrect NULL check in does_sb_need_changing (git-fixes).\n- md: fix an incorrect NULL check in md_reload_sb (git-fixes).\n- media: cx25821: Fix the warning when removing the module (git-fixes).\n- media: netup_unidvb: Do not leak SPI master in probe error path (git-fixes).\n- media: pci: cx23885: Fix the error handling in cx23885_initdev() (git-fixes).\n- media: venus: hfi: avoid null dereference in deinit (git-fixes).\n- misc: rtsx: set NULL intfdata when probe fails (git-fixes).\n- mmc: block: Fix CQE recovery reset success (git-fixes).\n- mmc: jz4740: Apply DMA engine limits to maximum segment size (git-fixes).\n- modpost: fix removing numeric suffixes (git-fixes).\n- modpost: fix undefined behavior of is_arm_mapping_symbol() (git-fixes).\n- mt76: check return value of mt76_txq_send_burst in mt76_txq_schedule_list (git-fixes).\n- mwifiex: add mutex lock for call in mwifiex_dfs_chan_sw_work_queue (git-fixes).\n- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).\n- net: rtlwifi: properly check for alloc_workqueue() failure (git-fixes).\n- nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).\n- nfc: st21nfca: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).\n- nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling (git-fixes).\n- NFS: Do not report ENOSPC write errors twice (git-fixes).\n- nfsd: Fix null-ptr-deref in nfsd_fill_super() (git-fixes).\n- PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology (bsc#1199365).\n- pcmcia: db1xxx_ss: restrict to MIPS_DB1XXX boards (git-fixes).\n- pinctrl: sunxi: fix f1c100s uart2 function (git-fixes).\n- platform/chrome: cros_ec_proto: Send command again when timeout occurs (git-fixes).\n- platform/x86: wmi: Fix driver-\u003enotify() vs -\u003eprobe() race (git-fixes).\n- platform/x86: wmi: Replace read_takes_no_args with a flags field (git-fixes).\n- PM / devfreq: rk3399_dmc: Disable edev on remove() (git-fixes).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- raid5: introduce MD_BROKEN (git-fixes).\n- random: Add and use pr_fmt() (bsc#1184924).\n- random: remove unnecessary unlikely() (bsc#1184924).\n- rtl818x: Prevent using not initialized queues (git-fixes).\n- rtlwifi: Use pr_warn instead of WARN_ONCE (git-fixes).\n- s390: fix detection of vector enhancements facility 1 vs. vector packed decimal facility (git-fixes).\n- s390: fix strrchr() implementation (git-fixes).\n- s390/cio: dont call css_wait_for_slow_path() inside a lock (git-fixes).\n- s390/cio: Fix the \u0027type\u0027 field in s390_cio_tpi tracepoint (git-fixes).\n- s390/crypto: fix scatterwalk_unmap() callers in AES-GCM (git-fixes).\n- s390/ctcm: fix potential memory leak (git-fixes).\n- s390/ctcm: fix variable dereferenced before check (git-fixes).\n- s390/dasd: fix data corruption for ESE devices (bsc#1200207 LTC#198454).\n- s390/dasd: Fix read for ESE with blksize 4k (bsc#1200206 LTC#198455).\n- s390/dasd: Fix read inconsistency for ESE DASD devices (bsc#1200206 LTC#198455).\n- s390/dasd: prevent double format of tracks for ESE devices (bsc#1200207 LTC#198454).\n- s390/ftrace: fix ftrace_update_ftrace_func implementation (git-fixes).\n- s390/lcs: fix variable dereferenced before check (git-fixes).\n- s390/mcck: fix invalid KVM guest condition check (git-fixes).\n- s390/mcck: isolate SIE instruction when setting CIF_MCCK_GUEST flag (git-fixes).\n- s390/nmi: handle guarded storage validity failures for KVM guests (git-fixes).\n- s390/nmi: handle vector validity failures for KVM guests (git-fixes).\n- s390/pv: fix the forcing of the swiotlb (git-fixes).\n- s390/qdio: cancel the ESTABLISH ccw after timeout (git-fixes).\n- s390/qdio: fix roll-back after timeout on ESTABLISH ccw (git-fixes).\n- s390/vfio-ap: fix circular lockdep when setting/clearing crypto masks (git-fixes).\n- serial: msm_serial: disable interrupts in __msm_console_write() (git-fixes).\n- spi: Introduce device-managed SPI controller allocation (git-fixes).\n- spi: spi-rspi: Remove setting {src,dst}_{addr,addr_width} based on DMA direction (git-fixes).\n- spi: stm32-qspi: Fix wait_cmd timeout in APM mode (git-fixes).\n- staging: rtl8712: fix uninit-value in r871xu_drv_init() (git-fixes).\n- staging: rtl8712: fix uninit-value in usb_read8() and friends (git-fixes).\n- tilcdc: tilcdc_external: fix an incorrect NULL check on list iterator (git-fixes).\n- tty: Fix a possible resource leak in icom_probe (git-fixes).\n- tty: synclink_gt: Fix null-pointer-dereference in slgt_clean() (git-fixes).\n- usb: core: hcd: Add support for deferring roothub registration (git-fixes).\n- usb: dwc2: gadget: do not reset gadget\u0027s driver-\u003ebus (git-fixes).\n- usb: hcd-pci: Fully suspend across freeze/thaw cycle (git-fixes).\n- usb: host: isp116x: check return value after calling platform_get_resource() (git-fixes).\n- usb: new quirk for Dell Gen 2 devices (git-fixes).\n- usb: serial: option: add Quectel BG95 modem (git-fixes).\n- vfio-ccw: Check initialized flag in cp_init() (git-fixes).\n- vfio/ccw: Remove unneeded GFP_DMA (git-fixes).\n- video: fbdev: pxa3xx-gcu: release the resources correctly in pxa3xx_gcu_probe/remove() (git-fixes).\n- virtio/s390: implement virtio-ccw revision 2 correctly (git-fixes).\n- vringh: Fix loop descriptors check in the indirect cases (git-fixes).\n- watchdog: wdat_wdt: Stop watchdog when rebooting the system (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-2172,SUSE-SLE-Module-Public-Cloud-15-SP3-2022-2172,openSUSE-SLE-15.3-2022-2172",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2172-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:2172-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222172-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:2172-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html"
},
{
"category": "self",
"summary": "SUSE Bug 1177282",
"url": "https://bugzilla.suse.com/1177282"
},
{
"category": "self",
"summary": "SUSE Bug 1184924",
"url": "https://bugzilla.suse.com/1184924"
},
{
"category": "self",
"summary": "SUSE Bug 1198924",
"url": "https://bugzilla.suse.com/1198924"
},
{
"category": "self",
"summary": "SUSE Bug 1199365",
"url": "https://bugzilla.suse.com/1199365"
},
{
"category": "self",
"summary": "SUSE Bug 1199482",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "self",
"summary": "SUSE Bug 1200015",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "self",
"summary": "SUSE Bug 1200143",
"url": "https://bugzilla.suse.com/1200143"
},
{
"category": "self",
"summary": "SUSE Bug 1200144",
"url": "https://bugzilla.suse.com/1200144"
},
{
"category": "self",
"summary": "SUSE Bug 1200206",
"url": "https://bugzilla.suse.com/1200206"
},
{
"category": "self",
"summary": "SUSE Bug 1200207",
"url": "https://bugzilla.suse.com/1200207"
},
{
"category": "self",
"summary": "SUSE Bug 1200249",
"url": "https://bugzilla.suse.com/1200249"
},
{
"category": "self",
"summary": "SUSE Bug 1200259",
"url": "https://bugzilla.suse.com/1200259"
},
{
"category": "self",
"summary": "SUSE Bug 1200263",
"url": "https://bugzilla.suse.com/1200263"
},
{
"category": "self",
"summary": "SUSE Bug 1200343",
"url": "https://bugzilla.suse.com/1200343"
},
{
"category": "self",
"summary": "SUSE Bug 1200494",
"url": "https://bugzilla.suse.com/1200494"
},
{
"category": "self",
"summary": "SUSE Bug 1200529",
"url": "https://bugzilla.suse.com/1200529"
},
{
"category": "self",
"summary": "SUSE Bug 1200604",
"url": "https://bugzilla.suse.com/1200604"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26541 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1012 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1966 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1974 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1975 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1975/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20141 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32250 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32250/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-06-24T08:33:58Z",
"generator": {
"date": "2022-06-24T08:33:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:2172-1",
"initial_release_date": "2022-06-24T08:33:58Z",
"revision_history": [
{
"date": "2022-06-24T08:33:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-150300.38.62.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"product_id": "kernel-source-azure-5.3.18-150300.38.62.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-150300.38.62.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-150300.38.62.1.x86_64",
"product_id": "kernel-azure-5.3.18-150300.38.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-150300.38.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-150300.38.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"product_id": "kernel-azure-optional-5.3.18-150300.38.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-150300.38.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-150300.38.62.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-150300.38.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-150300.38.62.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-150300.38.62.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-150300.38.62.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-150300.38.62.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64"
},
"product_reference": "cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64"
},
"product_reference": "dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64"
},
"product_reference": "gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-150300.38.62.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-150300.38.62.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-150300.38.62.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.3.18-150300.38.62.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64"
},
"product_reference": "kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64"
},
"product_reference": "kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.3.18-150300.38.62.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64"
},
"product_reference": "kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-150300.38.62.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-150300.38.62.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-150300.38.62.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64"
},
"product_reference": "kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64"
},
"product_reference": "ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
},
"product_reference": "reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26541"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26541",
"url": "https://www.suse.com/security/cve/CVE-2020-26541"
},
{
"category": "external",
"summary": "SUSE Bug 1177282 for CVE-2020-26541",
"url": "https://bugzilla.suse.com/1177282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-24T08:33:58Z",
"details": "moderate"
}
],
"title": "CVE-2020-26541"
},
{
"cve": "CVE-2022-1012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1012"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1012",
"url": "https://www.suse.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "SUSE Bug 1199482 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "external",
"summary": "SUSE Bug 1199694 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199694"
},
{
"category": "external",
"summary": "SUSE Bug 1202335 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1202335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-24T08:33:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-1966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1966"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1966",
"url": "https://www.suse.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "SUSE Bug 1200015 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "external",
"summary": "SUSE Bug 1200268 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200268"
},
{
"category": "external",
"summary": "SUSE Bug 1200494 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200494"
},
{
"category": "external",
"summary": "SUSE Bug 1200529 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-24T08:33:58Z",
"details": "important"
}
],
"title": "CVE-2022-1966"
},
{
"cve": "CVE-2022-1974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1974"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1974",
"url": "https://www.suse.com/security/cve/CVE-2022-1974"
},
{
"category": "external",
"summary": "SUSE Bug 1200144 for CVE-2022-1974",
"url": "https://bugzilla.suse.com/1200144"
},
{
"category": "external",
"summary": "SUSE Bug 1200265 for CVE-2022-1974",
"url": "https://bugzilla.suse.com/1200265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-24T08:33:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-1974"
},
{
"cve": "CVE-2022-1975",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1975"
}
],
"notes": [
{
"category": "general",
"text": "There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1975",
"url": "https://www.suse.com/security/cve/CVE-2022-1975"
},
{
"category": "external",
"summary": "SUSE Bug 1200143 for CVE-2022-1975",
"url": "https://bugzilla.suse.com/1200143"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-24T08:33:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-1975"
},
{
"cve": "CVE-2022-20141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20141"
}
],
"notes": [
{
"category": "general",
"text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20141",
"url": "https://www.suse.com/security/cve/CVE-2022-20141"
},
{
"category": "external",
"summary": "SUSE Bug 1200604 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1200604"
},
{
"category": "external",
"summary": "SUSE Bug 1200605 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1200605"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1203034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-24T08:33:58Z",
"details": "moderate"
}
],
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-32250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32250"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32250",
"url": "https://www.suse.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "SUSE Bug 1200015 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "external",
"summary": "SUSE Bug 1200268 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1200268"
},
{
"category": "external",
"summary": "SUSE Bug 1200494 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1200494"
},
{
"category": "external",
"summary": "SUSE Bug 1202992 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1202992"
},
{
"category": "external",
"summary": "SUSE Bug 1202993 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1202993"
},
{
"category": "external",
"summary": "SUSE Bug 1203002 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1203002"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.62.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.62.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.62.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-24T08:33:58Z",
"details": "important"
}
],
"title": "CVE-2022-32250"
}
]
}
suse-su-2022:2549-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).\n- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).\n- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)\n- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).\n- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda/conexant: Fix missing beep setup (git-fixes).\n- ALSA: hda/realtek - Add HW8326 support (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).\n- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).\n- ALSA: hda/via: Fix missing beep setup (git-fixes).\n- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes)\n- arm64: ftrace: fix branch range checks (git-fixes)\n- ASoC: cs35l36: Update digital volume TLV (git-fixes).\n- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).\n- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).\n- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).\n- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).\n- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).\n- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).\n- ASoC: wm8962: Fix suspend while playing music (git-fixes).\n- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).\n- ata: libata: add qc-\u003eflags in ata_qc_complete_template tracepoint (git-fixes).\n- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).\n- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).\n- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).\n- bcache: fixup multiple threads crash (git-fixes).\n- bcache: improve multithreaded bch_btree_check() (git-fixes).\n- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).\n- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).\n- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).\n- bio: fix page leak bio_add_hw_page failure (git-fixes).\n- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).\n- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).\n- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).\n- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).\n- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762) \n- blk-mq: update hctx-\u003edispatch_busy in case of real scheduler (git-fixes).\n- block: advance iov_iter on bio_add_hw_page failure (git-fixes).\n- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).\n- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).\n- block: Fix kABI in blk-merge.c (bsc#1198020).\n- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).\n- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).\n- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).\n- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).\n- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).\n- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).\n- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).\n- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).\n- cifs: avoid parallel session setups on same channel (bsc#1200217).\n- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).\n- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).\n- cifs: call helper functions for marking channels for reconnect (bsc#1200217).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).\n- cifs: check for smb1 in open_cached_dir() (bsc#1200217).\n- cifs: check reconnects for channels of active tcons too (bsc#1200217).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).\n- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).\n- cifs: clean up an inconsistent indenting (bsc#1200217).\n- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).\n- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).\n- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).\n- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).\n- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).\n- cifs: fix handlecache and multiuser (bsc#1200217).\n- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).\n- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).\n- cifs: fix minor compile warning (bsc#1200217).\n- cifs: fix missed refcounting of ipc tcon (bsc#1200217).\n- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).\n- cifs: fix potential deadlock in direct reclaim (bsc#1200217).\n- cifs: fix potential double free during failed mount (bsc#1200217).\n- cifs: fix potential race with cifsd thread (bsc#1200217).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).\n- cifs: fix the connection state transitions with multichannel (bsc#1200217).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).\n- cifs: fix workstation_name for multiuser mounts (bsc#1200217).\n- cifs: force new session setup and tcon for dfs (bsc#1200217).\n- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).\n- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).\n- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).\n- cifs: make status checks in version independent callers (bsc#1200217).\n- cifs: mark sessions for reconnection in helper function (bsc#1200217).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).\n- cifs: move superblock magic defitions to magic.h (bsc#1200217).\n- cifs: potential buffer overflow in handling symlinks (bsc#1200217).\n- cifs: print TIDs as hex (bsc#1200217).\n- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).\n- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).\n- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).\n- cifs: release cached dentries only if mount is complete (bsc#1200217).\n- cifs: remove check of list iterator against head past the loop body (bsc#1200217).\n- cifs: remove redundant assignment to pointer p (bsc#1200217).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).\n- cifs: remove repeated state change in dfs tree connect (bsc#1200217).\n- cifs: remove unused variable ses_selected (bsc#1200217).\n- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).\n- cifs: return the more nuanced writeback error on close() (bsc#1200217).\n- cifs: sanitize multiple delimiters in prepath (bsc#1200217).\n- cifs: serialize all mount attempts (bsc#1200217).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).\n- cifs: skip trailing separators of prefix paths (bsc#1200217).\n- cifs: smbd: fix typo in comment (bsc#1200217).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).\n- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).\n- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).\n- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).\n- cifs: update internal module number (bsc#1193629).\n- cifs: update internal module number (bsc#1200217).\n- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).\n- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).\n- cifs: use new enum for ses_status (bsc#1200217).\n- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).\n- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).\n- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).\n- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).\n- drm/i915: Update TGL and RKL DMC firmware versions (bsc#1198924).\n- drm/msm: Fix double pm_runtime_disable() call (git-fixes).\n- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).\n- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- Fix a warning about a malformed kernel doc comment in cifs (bsc#1200217).\n- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).\n- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).\n- gtp: use icmp_ndo_send helper (git-fixes).\n- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).\n- i2c: designware: Use standard optional ref clock implementation (git-fixes).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).\n- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).\n- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).\n- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).\n- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).\n- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).\n- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).\n- jfs: fix divide error in dbNextAG (bsc#1200828).\n- kABI fix of sysctl_run_estimation (git-fixes).\n- kabi: nvme workaround header include (bsc#1201193).\n- kabi/severities: ignore KABI for NVMe target (bsc#1192761)\n- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).\n- md: fix update super 1.0 on rdev size change (git-fixes).\n- move devm_allocate to end of structure for kABI (git-fixes).\n- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).\n- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: ieee802154: ca8210: Stop leaking skb\u0027s (git-fixes).\n- net: lantiq: Add locking for TX DMA channel (git-fixes).\n- net: rose: fix UAF bugs caused by timer handler (git-fixes).\n- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).\n- net: usb: ax88179_178a: Fix packet receiving (git-fixes).\n- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).\n- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).\n- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).\n- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).\n- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).\n- NFS: Do not report flush errors in nfs_write_end() (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- NFS: Memory allocation failures are not server fatal errors (git-fixes).\n- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).\n- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).\n- nvdimm/region: Fix default alignment for small regions (git-fixes).\n- nvme: add CNTRLTYPE definitions for \u0027identify controller\u0027 (bsc#1192761).\n- nvme: Add connect option \u0027discovery\u0027 (bsc#1192761).\n- nvme: add new discovery log page entry definitions (bsc#1192761).\n- nvme: display correct subsystem NQN (bsc#1192761).\n- nvme: expose subsystem type in sysfs attribute \u0027subsystype\u0027 (bsc#1192761).\n- nvme: kabi fix nvme subsystype change (bsc#1192761)\n- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).\n- nvmet: add nvmet_req_subsys() helper (bsc#1192761).\n- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).\n- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).\n- nvmet: fix freeing unallocated p2pmem (git-fixes).\n- nvmet: make discovery NQN configurable (bsc#1192761).\n- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).\n- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).\n- nvmet: register discovery subsystem as \u0027current\u0027 (bsc#1192761).\n- nvmet: set \u0027CNTRLTYPE\u0027 in the identify controller data (bsc#1192761).\n- nvmet: switch check for subsystem type (bsc#1192761).\n- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).\n- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- random: Add and use pr_fmt() (bsc#1184924).\n- random: remove unnecessary unlikely() (bsc#1184924).\n- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).\n- Revert \u0027block: Fix a lockdep complaint triggered by request queue flushing\u0027 (git-fixes).\n- scsi: core: Show SCMD_LAST in text form (git-fixes).\n- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).\n- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).\n- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).\n- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).\n- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).\n- scsi: lpfc: Commonize VMID code location (bsc#1201193).\n- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).\n- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).\n- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).\n- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).\n- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).\n- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).\n- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).\n- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).\n- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).\n- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).\n- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).\n- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).\n- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).\n- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).\n- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).\n- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).\n- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).\n- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).\n- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).\n- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).\n- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).\n- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).\n- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).\n- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).\n- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).\n- scsi: qla2xxx: Remove setting of \u0027req\u0027 and \u0027rsp\u0027 parameters (bsc#1201160).\n- scsi: qla2xxx: Remove unused \u0027ql_dm_tgt_ex_pct\u0027 parameter (bsc#1201160).\n- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).\n- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).\n- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).\n- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).\n- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).\n- scsi: sd: Signal drive managed SMR disks (git-fixes).\n- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).\n- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).\n- scsi: sd_zbc: Improve zone revalidation (git-fixes).\n- scsi: sd_zbc: Remove unused inline functions (git-fixes).\n- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).\n- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).\n- smb3: add mount parm nosparse (bsc#1200217).\n- smb3: add trace point for lease not found issue (bsc#1200217).\n- smb3: add trace point for oplock not found (bsc#1200217).\n- smb3: check for null tcon (bsc#1200217).\n- smb3: cleanup and clarify status of tree connections (bsc#1200217).\n- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).\n- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).\n- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).\n- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217).\n- smb3: fix snapshot mount option (bsc#1200217).\n- smb3 improve error message when mount options conflict with posix (bsc#1200217).\n- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217).\n- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217).\n- smb3: move more common protocol header definitions to smbfs_common (bsc#1200217).\n- smb3: send NTLMSSP version information (bsc#1200217).\n- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).\n- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- sunvnet: use icmp_ndo_send helper (git-fixes).\n- tty: goldfish: Fix free_irq() on remove (git-fixes).\n- usb: chipidea: udc: check request status before setting device address (git-fixes).\n- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).\n- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).\n- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).\n- usbnet: fix memory allocation in helpers (git-fixes).\n- USB: serial: io_ti: add Agilent E5805A support (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support (git-fixes).\n- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).\n- veth: fix races around rq-\u003erx_notify_masked (git-fixes).\n- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).\n- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).\n- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).\n- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).\n- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).\n- x86/entry: Remove skip_r11rcx (bsc#1201644).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-2549,SUSE-SLE-Module-Basesystem-15-SP3-2022-2549,SUSE-SLE-Module-Development-Tools-15-SP3-2022-2549,SUSE-SLE-Module-Legacy-15-SP3-2022-2549,SUSE-SLE-Module-Live-Patching-15-SP3-2022-2549,SUSE-SLE-Product-HA-15-SP3-2022-2549,SUSE-SLE-Product-WE-15-SP3-2022-2549,SUSE-SUSE-MicroOS-5.1-2022-2549,SUSE-SUSE-MicroOS-5.2-2022-2549,openSUSE-SLE-15.3-2022-2549,openSUSE-SLE-15.4-2022-2549",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2549-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:2549-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222549-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:2549-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1179195",
"url": "https://bugzilla.suse.com/1179195"
},
{
"category": "self",
"summary": "SUSE Bug 1180814",
"url": "https://bugzilla.suse.com/1180814"
},
{
"category": "self",
"summary": "SUSE Bug 1184924",
"url": "https://bugzilla.suse.com/1184924"
},
{
"category": "self",
"summary": "SUSE Bug 1185762",
"url": "https://bugzilla.suse.com/1185762"
},
{
"category": "self",
"summary": "SUSE Bug 1192761",
"url": "https://bugzilla.suse.com/1192761"
},
{
"category": "self",
"summary": "SUSE Bug 1193629",
"url": "https://bugzilla.suse.com/1193629"
},
{
"category": "self",
"summary": "SUSE Bug 1194013",
"url": "https://bugzilla.suse.com/1194013"
},
{
"category": "self",
"summary": "SUSE Bug 1195504",
"url": "https://bugzilla.suse.com/1195504"
},
{
"category": "self",
"summary": "SUSE Bug 1195775",
"url": "https://bugzilla.suse.com/1195775"
},
{
"category": "self",
"summary": "SUSE Bug 1196901",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "self",
"summary": "SUSE Bug 1197362",
"url": "https://bugzilla.suse.com/1197362"
},
{
"category": "self",
"summary": "SUSE Bug 1197754",
"url": "https://bugzilla.suse.com/1197754"
},
{
"category": "self",
"summary": "SUSE Bug 1198020",
"url": "https://bugzilla.suse.com/1198020"
},
{
"category": "self",
"summary": "SUSE Bug 1198924",
"url": "https://bugzilla.suse.com/1198924"
},
{
"category": "self",
"summary": "SUSE Bug 1199482",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "self",
"summary": "SUSE Bug 1199487",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "self",
"summary": "SUSE Bug 1199489",
"url": "https://bugzilla.suse.com/1199489"
},
{
"category": "self",
"summary": "SUSE Bug 1199657",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "self",
"summary": "SUSE Bug 1200217",
"url": "https://bugzilla.suse.com/1200217"
},
{
"category": "self",
"summary": "SUSE Bug 1200263",
"url": "https://bugzilla.suse.com/1200263"
},
{
"category": "self",
"summary": "SUSE Bug 1200343",
"url": "https://bugzilla.suse.com/1200343"
},
{
"category": "self",
"summary": "SUSE Bug 1200442",
"url": "https://bugzilla.suse.com/1200442"
},
{
"category": "self",
"summary": "SUSE Bug 1200571",
"url": "https://bugzilla.suse.com/1200571"
},
{
"category": "self",
"summary": "SUSE Bug 1200599",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "self",
"summary": "SUSE Bug 1200600",
"url": "https://bugzilla.suse.com/1200600"
},
{
"category": "self",
"summary": "SUSE Bug 1200604",
"url": "https://bugzilla.suse.com/1200604"
},
{
"category": "self",
"summary": "SUSE Bug 1200605",
"url": "https://bugzilla.suse.com/1200605"
},
{
"category": "self",
"summary": "SUSE Bug 1200608",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "self",
"summary": "SUSE Bug 1200619",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "self",
"summary": "SUSE Bug 1200622",
"url": "https://bugzilla.suse.com/1200622"
},
{
"category": "self",
"summary": "SUSE Bug 1200692",
"url": "https://bugzilla.suse.com/1200692"
},
{
"category": "self",
"summary": "SUSE Bug 1200806",
"url": "https://bugzilla.suse.com/1200806"
},
{
"category": "self",
"summary": "SUSE Bug 1200807",
"url": "https://bugzilla.suse.com/1200807"
},
{
"category": "self",
"summary": "SUSE Bug 1200809",
"url": "https://bugzilla.suse.com/1200809"
},
{
"category": "self",
"summary": "SUSE Bug 1200810",
"url": "https://bugzilla.suse.com/1200810"
},
{
"category": "self",
"summary": "SUSE Bug 1200813",
"url": "https://bugzilla.suse.com/1200813"
},
{
"category": "self",
"summary": "SUSE Bug 1200816",
"url": "https://bugzilla.suse.com/1200816"
},
{
"category": "self",
"summary": "SUSE Bug 1200820",
"url": "https://bugzilla.suse.com/1200820"
},
{
"category": "self",
"summary": "SUSE Bug 1200821",
"url": "https://bugzilla.suse.com/1200821"
},
{
"category": "self",
"summary": "SUSE Bug 1200822",
"url": "https://bugzilla.suse.com/1200822"
},
{
"category": "self",
"summary": "SUSE Bug 1200825",
"url": "https://bugzilla.suse.com/1200825"
},
{
"category": "self",
"summary": "SUSE Bug 1200828",
"url": "https://bugzilla.suse.com/1200828"
},
{
"category": "self",
"summary": "SUSE Bug 1200829",
"url": "https://bugzilla.suse.com/1200829"
},
{
"category": "self",
"summary": "SUSE Bug 1200925",
"url": "https://bugzilla.suse.com/1200925"
},
{
"category": "self",
"summary": "SUSE Bug 1201050",
"url": "https://bugzilla.suse.com/1201050"
},
{
"category": "self",
"summary": "SUSE Bug 1201080",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "self",
"summary": "SUSE Bug 1201143",
"url": "https://bugzilla.suse.com/1201143"
},
{
"category": "self",
"summary": "SUSE Bug 1201147",
"url": "https://bugzilla.suse.com/1201147"
},
{
"category": "self",
"summary": "SUSE Bug 1201149",
"url": "https://bugzilla.suse.com/1201149"
},
{
"category": "self",
"summary": "SUSE Bug 1201160",
"url": "https://bugzilla.suse.com/1201160"
},
{
"category": "self",
"summary": "SUSE Bug 1201171",
"url": "https://bugzilla.suse.com/1201171"
},
{
"category": "self",
"summary": "SUSE Bug 1201177",
"url": "https://bugzilla.suse.com/1201177"
},
{
"category": "self",
"summary": "SUSE Bug 1201193",
"url": "https://bugzilla.suse.com/1201193"
},
{
"category": "self",
"summary": "SUSE Bug 1201222",
"url": "https://bugzilla.suse.com/1201222"
},
{
"category": "self",
"summary": "SUSE Bug 1201644",
"url": "https://bugzilla.suse.com/1201644"
},
{
"category": "self",
"summary": "SUSE Bug 1201664",
"url": "https://bugzilla.suse.com/1201664"
},
{
"category": "self",
"summary": "SUSE Bug 1201672",
"url": "https://bugzilla.suse.com/1201672"
},
{
"category": "self",
"summary": "SUSE Bug 1201673",
"url": "https://bugzilla.suse.com/1201673"
},
{
"category": "self",
"summary": "SUSE Bug 1201676",
"url": "https://bugzilla.suse.com/1201676"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26341 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26341/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4157 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1012 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1679 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20132 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20141 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20154 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29900 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29901 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33981 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-34918 page",
"url": "https://www.suse.com/security/cve/CVE-2022-34918/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-07-26T11:58:49Z",
"generator": {
"date": "2022-07-26T11:58:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:2549-1",
"initial_release_date": "2022-07-26T11:58:49Z",
"revision_history": [
{
"date": "2022-07-26T11:58:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-al-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-al-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-allwinner-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-altera-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-altera-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-amd-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-amd-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-amlogic-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-apm-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-apm-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-arm-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-arm-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-broadcom-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-cavium-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-exynos-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-freescale-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-hisilicon-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-lg-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-lg-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-marvell-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-mediatek-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-nvidia-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-qcom-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-renesas-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-rockchip-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-socionext-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-sprd-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-xilinx-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "dtb-zte-5.3.18-150300.59.87.1.aarch64",
"product_id": "dtb-zte-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-64kb-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-default-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"product_id": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-default-optional-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-preempt-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-syms-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-150300.59.87.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-150300.59.87.1.noarch",
"product_id": "kernel-devel-5.3.18-150300.59.87.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-150300.59.87.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-150300.59.87.1.noarch",
"product_id": "kernel-docs-5.3.18-150300.59.87.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"product_id": "kernel-docs-html-5.3.18-150300.59.87.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-150300.59.87.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-150300.59.87.1.noarch",
"product_id": "kernel-macros-5.3.18-150300.59.87.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-150300.59.87.1.noarch",
"product": {
"name": "kernel-source-5.3.18-150300.59.87.1.noarch",
"product_id": "kernel-source-5.3.18-150300.59.87.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-150300.59.87.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kernel-debug-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kernel-default-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"product_id": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kernel-default-optional-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kernel-syms-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-150300.59.87.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.87.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "kernel-default-5.3.18-150300.59.87.1.s390x",
"product_id": "kernel-default-5.3.18-150300.59.87.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"product_id": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"product_id": "kernel-default-devel-5.3.18-150300.59.87.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"product_id": "kernel-default-extra-5.3.18-150300.59.87.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.87.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"product_id": "kernel-default-optional-5.3.18-150300.59.87.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"product_id": "kernel-obs-build-5.3.18-150300.59.87.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-150300.59.87.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-150300.59.87.1.s390x",
"product_id": "kernel-syms-5.3.18-150300.59.87.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-150300.59.87.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.87.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-debug-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-default-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"product_id": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-default-optional-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_87-preempt-1-150300.7.5.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_87-preempt-1-150300.7.5.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_87-preempt-1-150300.7.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-preempt-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-syms-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.87.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.87.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.87.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.87.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.87.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.87.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.87.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.87.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-al-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-al-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-altera-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-amd-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-apm-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-arm-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-lg-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-zte-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-zte-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-debug-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.87.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.87.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.87.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.87.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.3.18-150300.59.87.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch"
},
"product_reference": "kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.87.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.87.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.87.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.87.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.3.18-150300.59.87.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-al-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-al-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-zte-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "dtb-zte-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-26341",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26341"
}
],
"notes": [
{
"category": "general",
"text": "Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26341",
"url": "https://www.suse.com/security/cve/CVE-2021-26341"
},
{
"category": "external",
"summary": "SUSE Bug 1196901 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "external",
"summary": "SUSE Bug 1201050 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1201050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:58:49Z",
"details": "moderate"
}
],
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-4157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4157"
}
],
"notes": [
{
"category": "general",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4157",
"url": "https://www.suse.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "SUSE Bug 1194013 for CVE-2021-4157",
"url": "https://bugzilla.suse.com/1194013"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:58:49Z",
"details": "low"
}
],
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2022-1012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1012"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1012",
"url": "https://www.suse.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "SUSE Bug 1199482 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "external",
"summary": "SUSE Bug 1199694 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199694"
},
{
"category": "external",
"summary": "SUSE Bug 1202335 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1202335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:58:49Z",
"details": "moderate"
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-1679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1679"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1679",
"url": "https://www.suse.com/security/cve/CVE-2022-1679"
},
{
"category": "external",
"summary": "SUSE Bug 1199487 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "external",
"summary": "SUSE Bug 1201080 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212316 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1212316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:58:49Z",
"details": "moderate"
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-20132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20132"
}
],
"notes": [
{
"category": "general",
"text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20132",
"url": "https://www.suse.com/security/cve/CVE-2022-20132"
},
{
"category": "external",
"summary": "SUSE Bug 1200619 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "external",
"summary": "SUSE Bug 1212287 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1212287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:58:49Z",
"details": "moderate"
}
],
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20141"
}
],
"notes": [
{
"category": "general",
"text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20141",
"url": "https://www.suse.com/security/cve/CVE-2022-20141"
},
{
"category": "external",
"summary": "SUSE Bug 1200604 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1200604"
},
{
"category": "external",
"summary": "SUSE Bug 1200605 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1200605"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1203034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:58:49Z",
"details": "moderate"
}
],
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-20154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20154"
}
],
"notes": [
{
"category": "general",
"text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20154",
"url": "https://www.suse.com/security/cve/CVE-2022-20154"
},
{
"category": "external",
"summary": "SUSE Bug 1200599 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "external",
"summary": "SUSE Bug 1200608 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:58:49Z",
"details": "moderate"
}
],
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-29900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29900"
}
],
"notes": [
{
"category": "general",
"text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29900",
"url": "https://www.suse.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:58:49Z",
"details": "moderate"
}
],
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29901"
}
],
"notes": [
{
"category": "general",
"text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29901",
"url": "https://www.suse.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:58:49Z",
"details": "moderate"
}
],
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-33981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33981"
}
],
"notes": [
{
"category": "general",
"text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33981",
"url": "https://www.suse.com/security/cve/CVE-2022-33981"
},
{
"category": "external",
"summary": "SUSE Bug 1200692 for CVE-2022-33981",
"url": "https://bugzilla.suse.com/1200692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:58:49Z",
"details": "moderate"
}
],
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-34918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-34918"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-34918",
"url": "https://www.suse.com/security/cve/CVE-2022-34918"
},
{
"category": "external",
"summary": "SUSE Bug 1201171 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201171"
},
{
"category": "external",
"summary": "SUSE Bug 1201177 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201177"
},
{
"category": "external",
"summary": "SUSE Bug 1201222 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_87-default-1-150300.7.5.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-150300.59.87.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-150300.59.87.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap 15.4:dtb-al-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap 15.4:dtb-zte-5.3.18-150300.59.87.1.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:58:49Z",
"details": "important"
}
],
"title": "CVE-2022-34918"
}
]
}
suse-su-2022:2377-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).\n- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).\n- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)\n- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).\n- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n- CVE-2020-26541: Enforce the secure boot forbidden signature database (aka dbx) protection mechanism. (bsc#1177282)\n- CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).\n- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).\n\nThe following non-security bugs were fixed:\n\n- audit: fix a race condition with the auditd tracking code (bsc#1197170).\n- block: bio-integrity: Advance seed correctly for larger interval sizes (git-fixes).\n- bnxt_en: Remove the setting of dev_port (git-fixes).\n- bonding: fix bond_neigh_init() (git-fixes).\n- dm crypt: Avoid percpu_counter spinlock contention in crypt_page_alloc() (git-fixes).\n- drbd: fix duplicate array initializer (git-fixes).\n- drbd: remove assign_p_sizes_qlim (git-fixes).\n- drbd: use bdev_alignment_offset instead of queue_alignment_offset (git-fixes).\n- drbd: use bdev based limit helpers in drbd_send_sizes (git-fixes).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- fs-writeback: writeback_sb_inodes Recalculate \u0027wrote\u0027 according skipped pages (bsc#1200873).\n- i915_vma: Rename vma_lookup to i915_vma_lookup (git-fixes).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- Input: bcm5974 - set missing URB_NO_TRANSFER_DMA_MAP urb flag (git-fixes).\n- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).\n- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).\n- Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- kvm: fix wrong exception emulation in check_rdtsc (git-fixes).\n- kvm: i8254: remove redundant assignment to pointer s (git-fixes).\n- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (git-fixes).\n- KVM: s390: vsie/gmap: reduce gmap_rmap overhead (git-fixes).\n- KVM: x86: Allocate new rmap and large page tracking when moving memslot (git-fixes).\n- KVM: x86: always stop emulation on page fault (git-fixes).\n- KVM: x86: clear stale x86_emulate_ctxt-\u003eintercept value (git-fixes).\n- KVM: x86: clflushopt should be treated as a no-op by emulation (git-fixes).\n- kvm: x86/cpuid: Only provide CPUID leaf 0xA if host has architectural PMU (git-fixes).\n- KVM: x86: Do not force set BSP bit when local APIC is managed by userspace (git-fixes).\n- KVM: x86: do not modify masked bits of shared MSRs (git-fixes).\n- KVM: x86/emulator: Defer not-present segment check in __load_segment_descriptor() (git-fixes).\n- KVM: x86: Fix emulation in writing cr8 (git-fixes).\n- KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce (git-fixes).\n- KVM: x86: Fix potential put_fpu() w/o load_fpu() on MPX platform (git-fixes).\n- KVM: x86: Fix x86_decode_insn() return when fetching insn bytes fails (git-fixes).\n- KVM: x86: Free wbinvd_dirty_mask if vCPU creation fails (git-fixes).\n- kvm: x86: Improve emulation of CPUID leaves 0BH and 1FH (git-fixes).\n- KVM: x86: Inject #GP if guest attempts to toggle CR4.LA57 in 64-bit mode (git-fixes).\n- KVM: x86: Manually calculate reserved bits when loading PDPTRS (git-fixes).\n- KVM: x86: Manually flush collapsible SPTEs only when toggling flags (git-fixes).\n- KVM: x86: Migrate the PIT only if vcpu0 is migrated, not any BSP (git-fixes).\n- KVM: x86/mmu: Treat invalid shadow pages as obsolete (git-fixes).\n- KVM: x86: Refactor prefix decoding to prevent Spectre-v1/L1TF attacks (git-fixes).\n- KVM: x86: Remove spurious clearing of async #PF MSR (git-fixes).\n- KVM: x86: Remove spurious kvm_mmu_unload() from vcpu destruction path (git-fixes).\n- KVM: x86: remove stale comment from struct x86_emulate_ctxt (git-fixes).\n- KVM: x86: set ctxt-\u003ehave_exception in x86_decode_insn() (git-fixes).\n- kvm: x86: skip populating logical dest map if apic is not sw enabled (git-fixes).\n- KVM: x86: Trace the original requested CPUID function in kvm_cpuid() (git-fixes).\n- KVM: x86: Update vCPU\u0027s hv_clock before back to guest when tsc_offset is adjusted (git-fixes).\n- md: bcache: check the return value of kzalloc() in detached_dev_do_request() (git-fixes).\n- md: fix an incorrect NULL check in does_sb_need_changing (git-fixes).\n- md: fix an incorrect NULL check in md_reload_sb (git-fixes).\n- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).\n- mm: add vma_lookup(), update find_vma_intersection() comments (git-fixes).\n- net/mlx5: Avoid double free of root ns in the error flow path (git-fixes).\n- net/mlx5e: Replace reciprocal_scale in TX select queue function (git-fixes).\n- net/mlx5e: Switch to Toeplitz RSS hash by default (git-fixes).\n- net/mlx5: Fix auto group size calculation (git-fixes).\n- net: qed: Disable aRFS for NPAR and 100G (git-fixes).\n- net: qede: Disable aRFS for NPAR and 100G (git-fixes).\n- net: stmmac: update rx tail pointer register to fix rx dma hang issue (git-fixes).\n- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- PCI/ACPI: Allow D3 only if Root Port can signal and wake from D3 (git-fixes).\n- PCI: Tidy comments (git-fixes).\n- platform/chrome: cros_ec_proto: Send command again when timeout occurs (git-fixes).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- qed: Enable automatic recovery on error condition (bsc#1196964).\n- raid5: introduce MD_BROKEN (git-fixes).\n- s390: fix detection of vector enhancements facility 1 vs. vector packed decimal facility (git-fixes).\n- s390: fix strrchr() implementation (git-fixes).\n- s390/ftrace: fix ftrace_update_ftrace_func implementation (git-fixes).\n- s390/gmap: do not unconditionally call pte_unmap_unlock() in __gmap_zap() (git-fixes).\n- s390/gmap: validate VMA in __gmap_zap() (git-fixes).\n- s390/mm: fix VMA and page table handling code in storage key handling functions (git-fixes).\n- s390/mm: validate VMA in PGSTE manipulation functions (git-fixes).\n- scsi: dc395x: Fix a missing check on list iterator (git-fixes).\n- scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled (git-fixes).\n- scsi: ufs: qcom: Fix ufs_qcom_resume() (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- target: remove an incorrect unmap zeroes data deduction (git-fixes).\n- tracing: Fix return value of trace_pid_write() (git-fixes).\n- usb: musb: Fix missing of_node_put() in omap2430_probe (git-fixes).\n- USB: serial: option: add Quectel BG95 modem (git-fixes).\n- USB: storage: karma: fix rio_karma_init return (git-fixes).\n- usb: usbip: add missing device lock on tweak configuration cmd (git-fixes).\n- usb: usbip: fix a refcount leak in stub_probe() (git-fixes).\n- video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup (bsc#1129770)\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-2377,SUSE-SLE-SERVER-12-SP5-2022-2377",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2377-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:2377-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222377-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:2377-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1177282",
"url": "https://bugzilla.suse.com/1177282"
},
{
"category": "self",
"summary": "SUSE Bug 1194013",
"url": "https://bugzilla.suse.com/1194013"
},
{
"category": "self",
"summary": "SUSE Bug 1196964",
"url": "https://bugzilla.suse.com/1196964"
},
{
"category": "self",
"summary": "SUSE Bug 1197170",
"url": "https://bugzilla.suse.com/1197170"
},
{
"category": "self",
"summary": "SUSE Bug 1199482",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "self",
"summary": "SUSE Bug 1199487",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "self",
"summary": "SUSE Bug 1199657",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "self",
"summary": "SUSE Bug 1200343",
"url": "https://bugzilla.suse.com/1200343"
},
{
"category": "self",
"summary": "SUSE Bug 1200571",
"url": "https://bugzilla.suse.com/1200571"
},
{
"category": "self",
"summary": "SUSE Bug 1200599",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "self",
"summary": "SUSE Bug 1200600",
"url": "https://bugzilla.suse.com/1200600"
},
{
"category": "self",
"summary": "SUSE Bug 1200604",
"url": "https://bugzilla.suse.com/1200604"
},
{
"category": "self",
"summary": "SUSE Bug 1200605",
"url": "https://bugzilla.suse.com/1200605"
},
{
"category": "self",
"summary": "SUSE Bug 1200608",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "self",
"summary": "SUSE Bug 1200619",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "self",
"summary": "SUSE Bug 1200692",
"url": "https://bugzilla.suse.com/1200692"
},
{
"category": "self",
"summary": "SUSE Bug 1200762",
"url": "https://bugzilla.suse.com/1200762"
},
{
"category": "self",
"summary": "SUSE Bug 1200806",
"url": "https://bugzilla.suse.com/1200806"
},
{
"category": "self",
"summary": "SUSE Bug 1200807",
"url": "https://bugzilla.suse.com/1200807"
},
{
"category": "self",
"summary": "SUSE Bug 1200809",
"url": "https://bugzilla.suse.com/1200809"
},
{
"category": "self",
"summary": "SUSE Bug 1200810",
"url": "https://bugzilla.suse.com/1200810"
},
{
"category": "self",
"summary": "SUSE Bug 1200813",
"url": "https://bugzilla.suse.com/1200813"
},
{
"category": "self",
"summary": "SUSE Bug 1200820",
"url": "https://bugzilla.suse.com/1200820"
},
{
"category": "self",
"summary": "SUSE Bug 1200821",
"url": "https://bugzilla.suse.com/1200821"
},
{
"category": "self",
"summary": "SUSE Bug 1200822",
"url": "https://bugzilla.suse.com/1200822"
},
{
"category": "self",
"summary": "SUSE Bug 1200829",
"url": "https://bugzilla.suse.com/1200829"
},
{
"category": "self",
"summary": "SUSE Bug 1200868",
"url": "https://bugzilla.suse.com/1200868"
},
{
"category": "self",
"summary": "SUSE Bug 1200869",
"url": "https://bugzilla.suse.com/1200869"
},
{
"category": "self",
"summary": "SUSE Bug 1200870",
"url": "https://bugzilla.suse.com/1200870"
},
{
"category": "self",
"summary": "SUSE Bug 1200871",
"url": "https://bugzilla.suse.com/1200871"
},
{
"category": "self",
"summary": "SUSE Bug 1200872",
"url": "https://bugzilla.suse.com/1200872"
},
{
"category": "self",
"summary": "SUSE Bug 1200873",
"url": "https://bugzilla.suse.com/1200873"
},
{
"category": "self",
"summary": "SUSE Bug 1200925",
"url": "https://bugzilla.suse.com/1200925"
},
{
"category": "self",
"summary": "SUSE Bug 1201080",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "self",
"summary": "SUSE Bug 1201251",
"url": "https://bugzilla.suse.com/1201251"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26541 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4157 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1012 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1679 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20132 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20141 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20154 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2318 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26365 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29900 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29901 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33740 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33741 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33742 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33981 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33981/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-07-12T16:24:12Z",
"generator": {
"date": "2022-07-12T16:24:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:2377-1",
"initial_release_date": "2022-07-12T16:24:12Z",
"revision_history": [
{
"date": "2022-07-12T16:24:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.103.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.103.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.103.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.103.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.103.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.103.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.103.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.103.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.103.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.103.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.103.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.103.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.103.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.103.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.103.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.103.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.103.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.103.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.103.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.103.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.103.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.103.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.103.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.103.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.103.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.103.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.103.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.103.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.103.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.103.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.103.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.103.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.103.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.103.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.103.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.103.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.103.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.103.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26541"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26541",
"url": "https://www.suse.com/security/cve/CVE-2020-26541"
},
{
"category": "external",
"summary": "SUSE Bug 1177282 for CVE-2020-26541",
"url": "https://bugzilla.suse.com/1177282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-12T16:24:12Z",
"details": "moderate"
}
],
"title": "CVE-2020-26541"
},
{
"cve": "CVE-2021-4157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4157"
}
],
"notes": [
{
"category": "general",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4157",
"url": "https://www.suse.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "SUSE Bug 1194013 for CVE-2021-4157",
"url": "https://bugzilla.suse.com/1194013"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-12T16:24:12Z",
"details": "low"
}
],
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2022-1012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1012"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1012",
"url": "https://www.suse.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "SUSE Bug 1199482 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "external",
"summary": "SUSE Bug 1199694 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199694"
},
{
"category": "external",
"summary": "SUSE Bug 1202335 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1202335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-12T16:24:12Z",
"details": "moderate"
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-1679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1679"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1679",
"url": "https://www.suse.com/security/cve/CVE-2022-1679"
},
{
"category": "external",
"summary": "SUSE Bug 1199487 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "external",
"summary": "SUSE Bug 1201080 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212316 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1212316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-12T16:24:12Z",
"details": "moderate"
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-20132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20132"
}
],
"notes": [
{
"category": "general",
"text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20132",
"url": "https://www.suse.com/security/cve/CVE-2022-20132"
},
{
"category": "external",
"summary": "SUSE Bug 1200619 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "external",
"summary": "SUSE Bug 1212287 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1212287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-12T16:24:12Z",
"details": "moderate"
}
],
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20141"
}
],
"notes": [
{
"category": "general",
"text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20141",
"url": "https://www.suse.com/security/cve/CVE-2022-20141"
},
{
"category": "external",
"summary": "SUSE Bug 1200604 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1200604"
},
{
"category": "external",
"summary": "SUSE Bug 1200605 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1200605"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1203034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-12T16:24:12Z",
"details": "moderate"
}
],
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-20154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20154"
}
],
"notes": [
{
"category": "general",
"text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20154",
"url": "https://www.suse.com/security/cve/CVE-2022-20154"
},
{
"category": "external",
"summary": "SUSE Bug 1200599 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "external",
"summary": "SUSE Bug 1200608 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-12T16:24:12Z",
"details": "moderate"
}
],
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-2318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2318"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2318",
"url": "https://www.suse.com/security/cve/CVE-2022-2318"
},
{
"category": "external",
"summary": "SUSE Bug 1201251 for CVE-2022-2318",
"url": "https://bugzilla.suse.com/1201251"
},
{
"category": "external",
"summary": "SUSE Bug 1212303 for CVE-2022-2318",
"url": "https://bugzilla.suse.com/1212303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-12T16:24:12Z",
"details": "moderate"
}
],
"title": "CVE-2022-2318"
},
{
"cve": "CVE-2022-26365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26365"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26365",
"url": "https://www.suse.com/security/cve/CVE-2022-26365"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-26365",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-12T16:24:12Z",
"details": "moderate"
}
],
"title": "CVE-2022-26365"
},
{
"cve": "CVE-2022-29900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29900"
}
],
"notes": [
{
"category": "general",
"text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29900",
"url": "https://www.suse.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-12T16:24:12Z",
"details": "moderate"
}
],
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29901"
}
],
"notes": [
{
"category": "general",
"text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29901",
"url": "https://www.suse.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-12T16:24:12Z",
"details": "moderate"
}
],
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-33740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33740"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33740",
"url": "https://www.suse.com/security/cve/CVE-2022-33740"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-33740",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-12T16:24:12Z",
"details": "moderate"
}
],
"title": "CVE-2022-33740"
},
{
"cve": "CVE-2022-33741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33741"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33741",
"url": "https://www.suse.com/security/cve/CVE-2022-33741"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-33741",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-12T16:24:12Z",
"details": "moderate"
}
],
"title": "CVE-2022-33741"
},
{
"cve": "CVE-2022-33742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33742"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33742",
"url": "https://www.suse.com/security/cve/CVE-2022-33742"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-33742",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-12T16:24:12Z",
"details": "moderate"
}
],
"title": "CVE-2022-33742"
},
{
"cve": "CVE-2022-33981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33981"
}
],
"notes": [
{
"category": "general",
"text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33981",
"url": "https://www.suse.com/security/cve/CVE-2022-33981"
},
{
"category": "external",
"summary": "SUSE Bug 1200692 for CVE-2022-33981",
"url": "https://bugzilla.suse.com/1200692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-12T16:24:12Z",
"details": "moderate"
}
],
"title": "CVE-2022-33981"
}
]
}
suse-su-2022:2424-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 RT kernel was updated to 3.12.31 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).\n- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).\n- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)\n- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n\nThe following non-security bugs were fixed:\n\n- Add missing recommends of kernel-install-tools to kernel-source-vanilla (bsc#1200442)\n- Add various fsctl structs (bsc#1200217).\n- ALSA: hda/conexant: Fix missing beep setup (git-fixes).\n- ALSA: hda/realtek - Add HW8326 support (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).\n- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).\n- ALSA: hda/via: Fix missing beep setup (git-fixes).\n- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes)\n- arm64: ftrace: fix branch range checks (git-fixes)\n- ASoC: cs35l36: Update digital volume TLV (git-fixes).\n- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).\n- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).\n- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).\n- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).\n- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).\n- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).\n- ASoC: wm8962: Fix suspend while playing music (git-fixes).\n- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).\n- ata: libata: add qc-\u003eflags in ata_qc_complete_template tracepoint (git-fixes).\n- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).\n- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).\n- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).\n- bcache: fixup multiple threads crash (git-fixes).\n- bcache: improve multithreaded bch_btree_check() (git-fixes).\n- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).\n- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).\n- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).\n- bio: fix page leak bio_add_hw_page failure (git-fixes).\n- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).\n- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).\n- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).\n- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).\n- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762)\n- blk-mq: update hctx-\u003edispatch_busy in case of real scheduler (git-fixes).\n- block: advance iov_iter on bio_add_hw_page failure (git-fixes).\n- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).\n- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).\n- block: Fix kABI in blk-merge.c (bsc#1198020).\n- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).\n- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).\n- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).\n- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).\n- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).\n- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).\n- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).\n- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).\n- cifs: avoid parallel session setups on same channel (bsc#1200217).\n- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).\n- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).\n- cifs: call helper functions for marking channels for reconnect (bsc#1200217).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).\n- cifs: check for smb1 in open_cached_dir() (bsc#1200217).\n- cifs: check reconnects for channels of active tcons too (bsc#1200217).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).\n- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).\n- cifs: clean up an inconsistent indenting (bsc#1200217).\n- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).\n- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).\n- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).\n- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).\n- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).\n- cifs: fix handlecache and multiuser (bsc#1200217).\n- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).\n- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).\n- cifs: fix minor compile warning (bsc#1200217).\n- cifs: fix missed refcounting of ipc tcon (bsc#1200217).\n- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).\n- cifs: fix potential deadlock in direct reclaim (bsc#1200217).\n- cifs: fix potential double free during failed mount (bsc#1200217).\n- cifs: fix potential race with cifsd thread (bsc#1200217).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).\n- cifs: fix the connection state transitions with multichannel (bsc#1200217).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).\n- cifs: fix workstation_name for multiuser mounts (bsc#1200217).\n- cifs: force new session setup and tcon for dfs (bsc#1200217).\n- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).\n- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).\n- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).\n- cifs: make status checks in version independent callers (bsc#1200217).\n- cifs: mark sessions for reconnection in helper function (bsc#1200217).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).\n- cifs: move superblock magic defitions to magic.h (bsc#1200217).\n- cifs: potential buffer overflow in handling symlinks (bsc#1200217).\n- cifs: print TIDs as hex (bsc#1200217).\n- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).\n- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).\n- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).\n- cifs: release cached dentries only if mount is complete (bsc#1200217).\n- cifs: remove check of list iterator against head past the loop body (bsc#1200217).\n- cifs: remove redundant assignment to pointer p (bsc#1200217).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).\n- cifs: remove repeated state change in dfs tree connect (bsc#1200217).\n- cifs: remove unused variable ses_selected (bsc#1200217).\n- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).\n- cifs: return the more nuanced writeback error on close() (bsc#1200217).\n- cifs: sanitize multiple delimiters in prepath (bsc#1200217).\n- cifs: serialize all mount attempts (bsc#1200217).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).\n- cifs: skip trailing separators of prefix paths (bsc#1200217).\n- cifs: smbd: fix typo in comment (bsc#1200217).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).\n- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).\n- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).\n- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).\n- cifs: update internal module number (bsc#1193629).\n- cifs: update internal module number (bsc#1200217).\n- cifs: update internal module number (bsc#1200217).\n- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).\n- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).\n- cifs: use new enum for ses_status (bsc#1200217).\n- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).\n- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).\n- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).\n- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).\n- drm/i915: Update TGL and RKL DMC firmware versions (bsc#1198924).\n- drm/msm: Fix double pm_runtime_disable() call (git-fixes).\n- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).\n- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- Fix a warning about a malformed kernel doc comment in cifs (bsc#1200217).\n- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).\n- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).\n- gtp: use icmp_ndo_send helper (git-fixes).\n- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).\n- i2c: designware: Use standard optional ref clock implementation (git-fixes).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).\n- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).\n- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).\n- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).\n- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).\n- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).\n- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).\n- jfs: fix divide error in dbNextAG (bsc#1200828).\n- kABI fix of sysctl_run_estimation (git-fixes).\n- kabi: nvme workaround header include (bsc#1201193).\n- kabi/severities: ignore KABI for NVMe target (bsc#1192761)\n- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).\n- md: fix update super 1.0 on rdev size change (git-fixes).\n- move devm_allocate to end of structure for kABI (git-fixes).\n- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).\n- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: ieee802154: ca8210: Stop leaking skb\u0027s (git-fixes).\n- net: lantiq: Add locking for TX DMA channel (git-fixes).\n- net: rose: fix UAF bugs caused by timer handler (git-fixes).\n- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).\n- net: usb: ax88179_178a: Fix packet receiving (git-fixes).\n- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).\n- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).\n- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).\n- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).\n- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).\n- NFS: Do not report flush errors in nfs_write_end() (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- NFS: Memory allocation failures are not server fatal errors (git-fixes).\n- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).\n- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).\n- nvdimm/region: Fix default alignment for small regions (git-fixes).\n- nvme: add CNTRLTYPE definitions for \u0027identify controller\u0027 (bsc#1192761).\n- nvme: Add connect option \u0027discovery\u0027 (bsc#1192761).\n- nvme: add new discovery log page entry definitions (bsc#1192761).\n- nvme: display correct subsystem NQN (bsc#1192761).\n- nvme: expose subsystem type in sysfs attribute \u0027subsystype\u0027 (bsc#1192761).\n- nvme: kabi fix nvme subsystype change (bsc#1192761)\n- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).\n- nvmet: add nvmet_req_subsys() helper (bsc#1192761).\n- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).\n- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).\n- nvmet: fix freeing unallocated p2pmem (git-fixes).\n- nvmet: make discovery NQN configurable (bsc#1192761).\n- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).\n- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).\n- nvmet: register discovery subsystem as \u0027current\u0027 (bsc#1192761).\n- nvmet: set \u0027CNTRLTYPE\u0027 in the identify controller data (bsc#1192761).\n- nvmet: switch check for subsystem type (bsc#1192761).\n- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config\n- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).\n- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- random: Add and use pr_fmt() (bsc#1184924).\n- random: remove unnecessary unlikely() (bsc#1184924).\n- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).\n- Revert \u0027block: Fix a lockdep complaint triggered by request queue flushing\u0027 (git-fixes).\n- rpm/check-for-config-changes: ignore GCC12/CC_NO_ARRAY_BOUNDS\n- rpm/kernel-obs-build.spec.in: add systemd-initrd and terminfo dracut module (bsc#1195775)\n- rpm/kernel-obs-build.spec.in: Also depend on dracut-systemd (bsc#1195775)\n- scsi: core: Show SCMD_LAST in text form (git-fixes).\n- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).\n- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).\n- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).\n- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).\n- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).\n- scsi: lpfc: Commonize VMID code location (bsc#1201193).\n- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).\n- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).\n- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).\n- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).\n- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).\n- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).\n- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).\n- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).\n- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).\n- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).\n- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).\n- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).\n- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).\n- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).\n- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).\n- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).\n- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).\n- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).\n- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).\n- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).\n- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).\n- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).\n- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).\n- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).\n- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).\n- scsi: qla2xxx: Remove setting of \u0027req\u0027 and \u0027rsp\u0027 parameters (bsc#1201160).\n- scsi: qla2xxx: Remove unused \u0027ql_dm_tgt_ex_pct\u0027 parameter (bsc#1201160).\n- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).\n- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).\n- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).\n- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).\n- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).\n- scsi: sd: Signal drive managed SMR disks (git-fixes).\n- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).\n- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).\n- scsi: sd_zbc: Improve zone revalidation (git-fixes).\n- scsi: sd_zbc: Remove unused inline functions (git-fixes).\n- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).\n- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).\n- smb3: add mount parm nosparse (bsc#1200217).\n- smb3: add trace point for lease not found issue (bsc#1200217).\n- smb3: add trace point for oplock not found (bsc#1200217).\n- smb3: check for null tcon (bsc#1200217).\n- smb3: cleanup and clarify status of tree connections (bsc#1200217).\n- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).\n- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).\n- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).\n- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- smb3: fix snapshot mount option (bsc#1200217).\n- [smb3] improve error message when mount options conflict with posix (bsc#1200217).\n- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- [smb3] move more common protocol header definitions to smbfs_common (bsc#1200217). [ ematsumiya: remove ksmbd parts ]\n- smb3: send NTLMSSP version information (bsc#1200217).\n- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).\n- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- sunvnet: use icmp_ndo_send helper (git-fixes).\n- tty: goldfish: Fix free_irq() on remove (git-fixes).\n- usb: chipidea: udc: check request status before setting device address (git-fixes).\n- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).\n- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).\n- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).\n- usbnet: fix memory allocation in helpers (git-fixes).\n- USB: serial: io_ti: add Agilent E5805A support (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support (git-fixes).\n- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).\n- veth: fix races around rq-\u003erx_notify_masked (git-fixes).\n- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).\n- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).\n- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).\n- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).\n- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-2424,SUSE-SLE-Module-RT-15-SP3-2022-2424,SUSE-SUSE-MicroOS-5.1-2022-2424,SUSE-SUSE-MicroOS-5.2-2022-2424",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2424-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:2424-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222424-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:2424-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1179195",
"url": "https://bugzilla.suse.com/1179195"
},
{
"category": "self",
"summary": "SUSE Bug 1180814",
"url": "https://bugzilla.suse.com/1180814"
},
{
"category": "self",
"summary": "SUSE Bug 1184924",
"url": "https://bugzilla.suse.com/1184924"
},
{
"category": "self",
"summary": "SUSE Bug 1185762",
"url": "https://bugzilla.suse.com/1185762"
},
{
"category": "self",
"summary": "SUSE Bug 1192761",
"url": "https://bugzilla.suse.com/1192761"
},
{
"category": "self",
"summary": "SUSE Bug 1193629",
"url": "https://bugzilla.suse.com/1193629"
},
{
"category": "self",
"summary": "SUSE Bug 1194013",
"url": "https://bugzilla.suse.com/1194013"
},
{
"category": "self",
"summary": "SUSE Bug 1195504",
"url": "https://bugzilla.suse.com/1195504"
},
{
"category": "self",
"summary": "SUSE Bug 1195775",
"url": "https://bugzilla.suse.com/1195775"
},
{
"category": "self",
"summary": "SUSE Bug 1196901",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "self",
"summary": "SUSE Bug 1197362",
"url": "https://bugzilla.suse.com/1197362"
},
{
"category": "self",
"summary": "SUSE Bug 1197754",
"url": "https://bugzilla.suse.com/1197754"
},
{
"category": "self",
"summary": "SUSE Bug 1198020",
"url": "https://bugzilla.suse.com/1198020"
},
{
"category": "self",
"summary": "SUSE Bug 1198924",
"url": "https://bugzilla.suse.com/1198924"
},
{
"category": "self",
"summary": "SUSE Bug 1199482",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "self",
"summary": "SUSE Bug 1199487",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "self",
"summary": "SUSE Bug 1199489",
"url": "https://bugzilla.suse.com/1199489"
},
{
"category": "self",
"summary": "SUSE Bug 1199657",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "self",
"summary": "SUSE Bug 1200217",
"url": "https://bugzilla.suse.com/1200217"
},
{
"category": "self",
"summary": "SUSE Bug 1200263",
"url": "https://bugzilla.suse.com/1200263"
},
{
"category": "self",
"summary": "SUSE Bug 1200343",
"url": "https://bugzilla.suse.com/1200343"
},
{
"category": "self",
"summary": "SUSE Bug 1200442",
"url": "https://bugzilla.suse.com/1200442"
},
{
"category": "self",
"summary": "SUSE Bug 1200571",
"url": "https://bugzilla.suse.com/1200571"
},
{
"category": "self",
"summary": "SUSE Bug 1200599",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "self",
"summary": "SUSE Bug 1200600",
"url": "https://bugzilla.suse.com/1200600"
},
{
"category": "self",
"summary": "SUSE Bug 1200608",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "self",
"summary": "SUSE Bug 1200619",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "self",
"summary": "SUSE Bug 1200622",
"url": "https://bugzilla.suse.com/1200622"
},
{
"category": "self",
"summary": "SUSE Bug 1200692",
"url": "https://bugzilla.suse.com/1200692"
},
{
"category": "self",
"summary": "SUSE Bug 1200806",
"url": "https://bugzilla.suse.com/1200806"
},
{
"category": "self",
"summary": "SUSE Bug 1200807",
"url": "https://bugzilla.suse.com/1200807"
},
{
"category": "self",
"summary": "SUSE Bug 1200809",
"url": "https://bugzilla.suse.com/1200809"
},
{
"category": "self",
"summary": "SUSE Bug 1200810",
"url": "https://bugzilla.suse.com/1200810"
},
{
"category": "self",
"summary": "SUSE Bug 1200813",
"url": "https://bugzilla.suse.com/1200813"
},
{
"category": "self",
"summary": "SUSE Bug 1200816",
"url": "https://bugzilla.suse.com/1200816"
},
{
"category": "self",
"summary": "SUSE Bug 1200820",
"url": "https://bugzilla.suse.com/1200820"
},
{
"category": "self",
"summary": "SUSE Bug 1200821",
"url": "https://bugzilla.suse.com/1200821"
},
{
"category": "self",
"summary": "SUSE Bug 1200822",
"url": "https://bugzilla.suse.com/1200822"
},
{
"category": "self",
"summary": "SUSE Bug 1200825",
"url": "https://bugzilla.suse.com/1200825"
},
{
"category": "self",
"summary": "SUSE Bug 1200828",
"url": "https://bugzilla.suse.com/1200828"
},
{
"category": "self",
"summary": "SUSE Bug 1200829",
"url": "https://bugzilla.suse.com/1200829"
},
{
"category": "self",
"summary": "SUSE Bug 1200925",
"url": "https://bugzilla.suse.com/1200925"
},
{
"category": "self",
"summary": "SUSE Bug 1201050",
"url": "https://bugzilla.suse.com/1201050"
},
{
"category": "self",
"summary": "SUSE Bug 1201080",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "self",
"summary": "SUSE Bug 1201143",
"url": "https://bugzilla.suse.com/1201143"
},
{
"category": "self",
"summary": "SUSE Bug 1201147",
"url": "https://bugzilla.suse.com/1201147"
},
{
"category": "self",
"summary": "SUSE Bug 1201149",
"url": "https://bugzilla.suse.com/1201149"
},
{
"category": "self",
"summary": "SUSE Bug 1201160",
"url": "https://bugzilla.suse.com/1201160"
},
{
"category": "self",
"summary": "SUSE Bug 1201171",
"url": "https://bugzilla.suse.com/1201171"
},
{
"category": "self",
"summary": "SUSE Bug 1201177",
"url": "https://bugzilla.suse.com/1201177"
},
{
"category": "self",
"summary": "SUSE Bug 1201193",
"url": "https://bugzilla.suse.com/1201193"
},
{
"category": "self",
"summary": "SUSE Bug 1201222",
"url": "https://bugzilla.suse.com/1201222"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26341 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26341/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4157 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1012 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1679 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20132 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20154 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29900 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29901 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33981 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-34918 page",
"url": "https://www.suse.com/security/cve/CVE-2022-34918/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-07-18T06:45:43Z",
"generator": {
"date": "2022-07-18T06:45:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:2424-1",
"initial_release_date": "2022-07-18T06:45:43Z",
"revision_history": [
{
"date": "2022-07-18T06:45:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-150300.96.1.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-150300.96.1.noarch",
"product_id": "kernel-devel-rt-5.3.18-150300.96.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-150300.96.1.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-150300.96.1.noarch",
"product_id": "kernel-source-rt-5.3.18-150300.96.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt-devel-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt-extra-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt-optional-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt-optional-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt_debug-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-optional-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-rt_debug-optional-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-rt_debug-optional-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"product_id": "kernel-syms-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-150300.96.1.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-150300.96.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-150300.96.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-150300.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-150300.96.1.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.96.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP3",
"product": {
"name": "SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64"
},
"product_reference": "dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.3.18-150300.96.1.noarch as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch"
},
"product_reference": "kernel-devel-rt-5.3.18-150300.96.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-150300.96.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64"
},
"product_reference": "kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-150300.96.1.noarch as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-150300.96.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Real Time Module 15 SP3",
"product_id": "SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-150300.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-150300.96.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-150300.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-26341",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26341"
}
],
"notes": [
{
"category": "general",
"text": "Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26341",
"url": "https://www.suse.com/security/cve/CVE-2021-26341"
},
{
"category": "external",
"summary": "SUSE Bug 1196901 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "external",
"summary": "SUSE Bug 1201050 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1201050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-4157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4157"
}
],
"notes": [
{
"category": "general",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4157",
"url": "https://www.suse.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "SUSE Bug 1194013 for CVE-2021-4157",
"url": "https://bugzilla.suse.com/1194013"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:43Z",
"details": "low"
}
],
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2022-1012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1012"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1012",
"url": "https://www.suse.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "SUSE Bug 1199482 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "external",
"summary": "SUSE Bug 1199694 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199694"
},
{
"category": "external",
"summary": "SUSE Bug 1202335 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1202335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-1679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1679"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1679",
"url": "https://www.suse.com/security/cve/CVE-2022-1679"
},
{
"category": "external",
"summary": "SUSE Bug 1199487 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "external",
"summary": "SUSE Bug 1201080 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212316 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1212316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-20132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20132"
}
],
"notes": [
{
"category": "general",
"text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20132",
"url": "https://www.suse.com/security/cve/CVE-2022-20132"
},
{
"category": "external",
"summary": "SUSE Bug 1200619 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "external",
"summary": "SUSE Bug 1212287 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1212287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20154"
}
],
"notes": [
{
"category": "general",
"text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20154",
"url": "https://www.suse.com/security/cve/CVE-2022-20154"
},
{
"category": "external",
"summary": "SUSE Bug 1200599 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "external",
"summary": "SUSE Bug 1200608 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-29900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29900"
}
],
"notes": [
{
"category": "general",
"text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29900",
"url": "https://www.suse.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29901"
}
],
"notes": [
{
"category": "general",
"text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29901",
"url": "https://www.suse.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-33981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33981"
}
],
"notes": [
{
"category": "general",
"text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33981",
"url": "https://www.suse.com/security/cve/CVE-2022-33981"
},
{
"category": "external",
"summary": "SUSE Bug 1200692 for CVE-2022-33981",
"url": "https://bugzilla.suse.com/1200692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-34918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-34918"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-34918",
"url": "https://www.suse.com/security/cve/CVE-2022-34918"
},
{
"category": "external",
"summary": "SUSE Bug 1201171 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201171"
},
{
"category": "external",
"summary": "SUSE Bug 1201177 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201177"
},
{
"category": "external",
"summary": "SUSE Bug 1201222 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:cluster-md-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:dlm-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:gfs2-kmp-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-devel-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-rt_debug-devel-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:kernel-source-rt-5.3.18-150300.96.1.noarch",
"SUSE Real Time Module 15 SP3:kernel-syms-rt-5.3.18-150300.96.1.x86_64",
"SUSE Real Time Module 15 SP3:ocfs2-kmp-rt-5.3.18-150300.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-18T06:45:43Z",
"details": "important"
}
],
"title": "CVE-2022-34918"
}
]
}
suse-su-2022:2382-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).\n- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).\n- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)\n- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).\n- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n- CVE-2020-26541: Enforce the secure boot forbidden signature database (aka dbx) protection mechanism. (bsc#1177282)\n- CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).\n- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).\n\nThe following non-security bugs were fixed:\n\n- add mainline tag for a pci-hyperv change\n- audit: fix a race condition with the auditd tracking code (bsc#1197170).\n- block: bio-integrity: Advance seed correctly for larger interval sizes (git-fixes).\n- bnxt_en: Remove the setting of dev_port (git-fixes).\n- bonding: fix bond_neigh_init() (git-fixes).\n- dm crypt: Avoid percpu_counter spinlock contention in crypt_page_alloc() (git-fixes).\n- drbd: fix duplicate array initializer (git-fixes).\n- drbd: remove assign_p_sizes_qlim (git-fixes).\n- drbd: use bdev_alignment_offset instead of queue_alignment_offset (git-fixes).\n- drbd: use bdev based limit helpers in drbd_send_sizes (git-fixes).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix bug_on in ext4_writepages (bsc#1200872).\n- ext4: fix overhead calculation to account for the reserved gdt blocks (bsc#1200869).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: fix symlink file size not match to file content (bsc#1200868).\n- ext4: fix use-after-free in ext4_rename_dir_prepare (bsc#1200871).\n- ext4: force overhead calculation if the s_overhead_cluster makes no sense (bsc#1200870).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- fs-writeback: writeback_sb_inodes Recalculate \u0027wrote\u0027 according skipped pages (bsc#1200873).\n- i915_vma: Rename vma_lookup to i915_vma_lookup (git-fixes).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- Input: bcm5974 - set missing URB_NO_TRANSFER_DMA_MAP urb flag (git-fixes).\n- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).\n- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).\n- Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- kvm: fix wrong exception emulation in check_rdtsc (git-fixes).\n- kvm: i8254: remove redundant assignment to pointer s (git-fixes).\n- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (git-fixes).\n- KVM: s390: vsie/gmap: reduce gmap_rmap overhead (git-fixes).\n- KVM: x86: Allocate new rmap and large page tracking when moving memslot (git-fixes).\n- KVM: x86: always stop emulation on page fault (git-fixes).\n- KVM: x86: clear stale x86_emulate_ctxt-\u003eintercept value (git-fixes).\n- KVM: x86: clflushopt should be treated as a no-op by emulation (git-fixes).\n- kvm: x86/cpuid: Only provide CPUID leaf 0xA if host has architectural PMU (git-fixes).\n- KVM: x86: Do not force set BSP bit when local APIC is managed by userspace (git-fixes).\n- KVM: x86: do not modify masked bits of shared MSRs (git-fixes).\n- KVM: x86/emulator: Defer not-present segment check in __load_segment_descriptor() (git-fixes).\n- KVM: x86: Fix emulation in writing cr8 (git-fixes).\n- KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce (git-fixes).\n- KVM: x86: Fix potential put_fpu() w/o load_fpu() on MPX platform (git-fixes).\n- KVM: x86: Fix x86_decode_insn() return when fetching insn bytes fails (git-fixes).\n- KVM: x86: Free wbinvd_dirty_mask if vCPU creation fails (git-fixes).\n- kvm: x86: Improve emulation of CPUID leaves 0BH and 1FH (git-fixes).\n- KVM: x86: Inject #GP if guest attempts to toggle CR4.LA57 in 64-bit mode (git-fixes).\n- KVM: x86: Manually calculate reserved bits when loading PDPTRS (git-fixes).\n- KVM: x86: Manually flush collapsible SPTEs only when toggling flags (git-fixes).\n- KVM: x86: Migrate the PIT only if vcpu0 is migrated, not any BSP (git-fixes).\n- KVM: x86/mmu: Treat invalid shadow pages as obsolete (git-fixes).\n- KVM: x86: Refactor prefix decoding to prevent Spectre-v1/L1TF attacks (git-fixes).\n- KVM: x86: Remove spurious clearing of async #PF MSR (git-fixes).\n- KVM: x86: Remove spurious kvm_mmu_unload() from vcpu destruction path (git-fixes).\n- KVM: x86: remove stale comment from struct x86_emulate_ctxt (git-fixes).\n- KVM: x86: set ctxt-\u003ehave_exception in x86_decode_insn() (git-fixes).\n- kvm: x86: skip populating logical dest map if apic is not sw enabled (git-fixes).\n- KVM: x86: Trace the original requested CPUID function in kvm_cpuid() (git-fixes).\n- md: bcache: check the return value of kzalloc() in detached_dev_do_request() (git-fixes).\n- md: fix an incorrect NULL check in does_sb_need_changing (git-fixes).\n- md: fix an incorrect NULL check in md_reload_sb (git-fixes).\n- md/raid0: Ignore RAID0 layout if the second zone has only one device (git-fixes).\n- mm: add vma_lookup(), update find_vma_intersection() comments (git-fixes).\n- net/mlx5: Avoid double free of root ns in the error flow path (git-fixes).\n- net/mlx5e: Replace reciprocal_scale in TX select queue function (git-fixes).\n- net/mlx5e: Switch to Toeplitz RSS hash by default (git-fixes).\n- net/mlx5: Fix auto group size calculation (git-fixes).\n- net: qed: Disable aRFS for NPAR and 100G (git-fixes).\n- net: qede: Disable aRFS for NPAR and 100G (git-fixes).\n- net: stmmac: update rx tail pointer register to fix rx dma hang issue (git-fixes).\n- NFSD: Fix possible sleep during nfsd4_release_lockowner() (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- PCI/ACPI: Allow D3 only if Root Port can signal and wake from D3 (git-fixes).\n- PCI: Tidy comments (git-fixes).\n- platform/chrome: cros_ec_proto: Send command again when timeout occurs (git-fixes).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- qed: Enable automatic recovery on error condition (bsc#1196964).\n- raid5: introduce MD_BROKEN (git-fixes).\n- s390: fix detection of vector enhancements facility 1 vs. vector packed decimal facility (git-fixes).\n- s390: fix strrchr() implementation (git-fixes).\n- s390/ftrace: fix ftrace_update_ftrace_func implementation (git-fixes).\n- s390/gmap: do not unconditionally call pte_unmap_unlock() in __gmap_zap() (git-fixes).\n- s390/gmap: validate VMA in __gmap_zap() (git-fixes).\n- s390/mm: fix VMA and page table handling code in storage key handling functions (git-fixes).\n- s390/mm: validate VMA in PGSTE manipulation functions (git-fixes).\n- scsi: dc395x: Fix a missing check on list iterator (git-fixes).\n- scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled (git-fixes).\n- scsi: ufs: qcom: Fix ufs_qcom_resume() (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- target: remove an incorrect unmap zeroes data deduction (git-fixes).\n- tracing: Fix return value of trace_pid_write() (git-fixes).\n- usb: musb: Fix missing of_node_put() in omap2430_probe (git-fixes).\n- USB: serial: option: add Quectel BG95 modem (git-fixes).\n- USB: storage: karma: fix rio_karma_init return (git-fixes).\n- usb: usbip: add missing device lock on tweak configuration cmd (git-fixes).\n- usb: usbip: fix a refcount leak in stub_probe() (git-fixes).\n- video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup (bsc#1129770)\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-2382,SUSE-SLE-HA-12-SP5-2022-2382,SUSE-SLE-Live-Patching-12-SP5-2022-2382,SUSE-SLE-SDK-12-SP5-2022-2382,SUSE-SLE-SERVER-12-SP5-2022-2382,SUSE-SLE-WE-12-SP5-2022-2382",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2382-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:2382-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222382-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:2382-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1177282",
"url": "https://bugzilla.suse.com/1177282"
},
{
"category": "self",
"summary": "SUSE Bug 1194013",
"url": "https://bugzilla.suse.com/1194013"
},
{
"category": "self",
"summary": "SUSE Bug 1196964",
"url": "https://bugzilla.suse.com/1196964"
},
{
"category": "self",
"summary": "SUSE Bug 1197170",
"url": "https://bugzilla.suse.com/1197170"
},
{
"category": "self",
"summary": "SUSE Bug 1199482",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "self",
"summary": "SUSE Bug 1199487",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "self",
"summary": "SUSE Bug 1199657",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "self",
"summary": "SUSE Bug 1200343",
"url": "https://bugzilla.suse.com/1200343"
},
{
"category": "self",
"summary": "SUSE Bug 1200571",
"url": "https://bugzilla.suse.com/1200571"
},
{
"category": "self",
"summary": "SUSE Bug 1200599",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "self",
"summary": "SUSE Bug 1200600",
"url": "https://bugzilla.suse.com/1200600"
},
{
"category": "self",
"summary": "SUSE Bug 1200604",
"url": "https://bugzilla.suse.com/1200604"
},
{
"category": "self",
"summary": "SUSE Bug 1200605",
"url": "https://bugzilla.suse.com/1200605"
},
{
"category": "self",
"summary": "SUSE Bug 1200608",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "self",
"summary": "SUSE Bug 1200619",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "self",
"summary": "SUSE Bug 1200692",
"url": "https://bugzilla.suse.com/1200692"
},
{
"category": "self",
"summary": "SUSE Bug 1200762",
"url": "https://bugzilla.suse.com/1200762"
},
{
"category": "self",
"summary": "SUSE Bug 1200806",
"url": "https://bugzilla.suse.com/1200806"
},
{
"category": "self",
"summary": "SUSE Bug 1200807",
"url": "https://bugzilla.suse.com/1200807"
},
{
"category": "self",
"summary": "SUSE Bug 1200809",
"url": "https://bugzilla.suse.com/1200809"
},
{
"category": "self",
"summary": "SUSE Bug 1200810",
"url": "https://bugzilla.suse.com/1200810"
},
{
"category": "self",
"summary": "SUSE Bug 1200813",
"url": "https://bugzilla.suse.com/1200813"
},
{
"category": "self",
"summary": "SUSE Bug 1200820",
"url": "https://bugzilla.suse.com/1200820"
},
{
"category": "self",
"summary": "SUSE Bug 1200821",
"url": "https://bugzilla.suse.com/1200821"
},
{
"category": "self",
"summary": "SUSE Bug 1200822",
"url": "https://bugzilla.suse.com/1200822"
},
{
"category": "self",
"summary": "SUSE Bug 1200829",
"url": "https://bugzilla.suse.com/1200829"
},
{
"category": "self",
"summary": "SUSE Bug 1200868",
"url": "https://bugzilla.suse.com/1200868"
},
{
"category": "self",
"summary": "SUSE Bug 1200869",
"url": "https://bugzilla.suse.com/1200869"
},
{
"category": "self",
"summary": "SUSE Bug 1200870",
"url": "https://bugzilla.suse.com/1200870"
},
{
"category": "self",
"summary": "SUSE Bug 1200871",
"url": "https://bugzilla.suse.com/1200871"
},
{
"category": "self",
"summary": "SUSE Bug 1200872",
"url": "https://bugzilla.suse.com/1200872"
},
{
"category": "self",
"summary": "SUSE Bug 1200873",
"url": "https://bugzilla.suse.com/1200873"
},
{
"category": "self",
"summary": "SUSE Bug 1200925",
"url": "https://bugzilla.suse.com/1200925"
},
{
"category": "self",
"summary": "SUSE Bug 1201080",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "self",
"summary": "SUSE Bug 1201251",
"url": "https://bugzilla.suse.com/1201251"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26541 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4157 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1012 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1679 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20132 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20141 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20154 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2318 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26365 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29900 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29901 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33740 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33741 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33742 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33981 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33981/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-07-13T09:26:10Z",
"generator": {
"date": "2022-07-13T09:26:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:2382-1",
"initial_release_date": "2022-07-13T09:26:10Z",
"revision_history": [
{
"date": "2022-07-13T09:26:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.127.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.127.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.127.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.127.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.127.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.127.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.127.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.127.1.aarch64",
"product_id": "kernel-default-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.127.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.127.1.aarch64",
"product_id": "kernel-default-base-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.127.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.127.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.127.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.127.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.127.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.127.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.127.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.127.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.127.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.127.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.127.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.127.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.127.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.127.1.aarch64",
"product_id": "kernel-syms-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.127.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.127.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.127.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.127.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.127.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.127.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.127.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.127.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.127.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.127.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.127.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.127.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.127.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.127.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.127.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.127.1.noarch",
"product_id": "kernel-devel-4.12.14-122.127.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.127.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.127.1.noarch",
"product_id": "kernel-docs-4.12.14-122.127.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.127.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.127.1.noarch",
"product_id": "kernel-docs-html-4.12.14-122.127.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.127.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.127.1.noarch",
"product_id": "kernel-macros-4.12.14-122.127.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.127.1.noarch",
"product": {
"name": "kernel-source-4.12.14-122.127.1.noarch",
"product_id": "kernel-source-4.12.14-122.127.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.127.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.127.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.127.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-debug-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-default-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-syms-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.127.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.127.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.127.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.127.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.127.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.127.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.127.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.127.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.127.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-default-4.12.14-122.127.1.s390x",
"product_id": "kernel-default-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.127.1.s390x",
"product_id": "kernel-default-base-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.127.1.s390x",
"product_id": "kernel-default-devel-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.127.1.s390x",
"product_id": "kernel-default-extra-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.127.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.127.1.s390x",
"product_id": "kernel-default-man-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.127.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.127.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.127.1.s390x",
"product_id": "kernel-syms-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.127.1.s390x",
"product_id": "kernel-vanilla-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.127.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.127.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.127.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.127.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.127.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.127.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.127.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.127.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.127.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.127.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.127.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.127.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-122.127.1.x86_64",
"product_id": "kernel-debug-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-122.127.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-122.127.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.127.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.127.1.x86_64",
"product_id": "kernel-default-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.127.1.x86_64",
"product_id": "kernel-default-base-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.127.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.127.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.127.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.127.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.127.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.127.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.127.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.127.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.127.1.x86_64",
"product_id": "kernel-syms-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.127.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.127.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.127.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.127.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.127.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.127.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.127.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.127.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.127.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.127.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.127.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.127.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.127.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.127.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-122.127.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-122.127.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.127.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-122.127.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.127.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-122.127.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.127.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.127.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.127.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.127.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.127.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.127.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.127.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.127.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.127.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.127.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.127.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.127.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.127.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.127.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.127.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.127.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.127.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.127.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.127.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.127.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.127.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.127.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.127.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.127.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.127.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.127.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.127.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.127.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.127.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.127.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.127.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.127.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.127.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.127.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.127.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.127.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.127.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.127.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.127.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.127.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.127.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.127.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.127.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.127.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.127.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.127.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-122.127.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-122.127.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26541"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26541",
"url": "https://www.suse.com/security/cve/CVE-2020-26541"
},
{
"category": "external",
"summary": "SUSE Bug 1177282 for CVE-2020-26541",
"url": "https://bugzilla.suse.com/1177282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T09:26:10Z",
"details": "moderate"
}
],
"title": "CVE-2020-26541"
},
{
"cve": "CVE-2021-4157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4157"
}
],
"notes": [
{
"category": "general",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4157",
"url": "https://www.suse.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "SUSE Bug 1194013 for CVE-2021-4157",
"url": "https://bugzilla.suse.com/1194013"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T09:26:10Z",
"details": "low"
}
],
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2022-1012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1012"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1012",
"url": "https://www.suse.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "SUSE Bug 1199482 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "external",
"summary": "SUSE Bug 1199694 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199694"
},
{
"category": "external",
"summary": "SUSE Bug 1202335 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1202335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T09:26:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-1679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1679"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1679",
"url": "https://www.suse.com/security/cve/CVE-2022-1679"
},
{
"category": "external",
"summary": "SUSE Bug 1199487 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "external",
"summary": "SUSE Bug 1201080 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212316 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1212316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T09:26:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-20132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20132"
}
],
"notes": [
{
"category": "general",
"text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20132",
"url": "https://www.suse.com/security/cve/CVE-2022-20132"
},
{
"category": "external",
"summary": "SUSE Bug 1200619 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "external",
"summary": "SUSE Bug 1212287 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1212287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T09:26:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20141"
}
],
"notes": [
{
"category": "general",
"text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20141",
"url": "https://www.suse.com/security/cve/CVE-2022-20141"
},
{
"category": "external",
"summary": "SUSE Bug 1200604 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1200604"
},
{
"category": "external",
"summary": "SUSE Bug 1200605 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1200605"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1203034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T09:26:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-20154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20154"
}
],
"notes": [
{
"category": "general",
"text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20154",
"url": "https://www.suse.com/security/cve/CVE-2022-20154"
},
{
"category": "external",
"summary": "SUSE Bug 1200599 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "external",
"summary": "SUSE Bug 1200608 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T09:26:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-2318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2318"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2318",
"url": "https://www.suse.com/security/cve/CVE-2022-2318"
},
{
"category": "external",
"summary": "SUSE Bug 1201251 for CVE-2022-2318",
"url": "https://bugzilla.suse.com/1201251"
},
{
"category": "external",
"summary": "SUSE Bug 1212303 for CVE-2022-2318",
"url": "https://bugzilla.suse.com/1212303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T09:26:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-2318"
},
{
"cve": "CVE-2022-26365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26365"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26365",
"url": "https://www.suse.com/security/cve/CVE-2022-26365"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-26365",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T09:26:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-26365"
},
{
"cve": "CVE-2022-29900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29900"
}
],
"notes": [
{
"category": "general",
"text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29900",
"url": "https://www.suse.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T09:26:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29901"
}
],
"notes": [
{
"category": "general",
"text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29901",
"url": "https://www.suse.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T09:26:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-33740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33740"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33740",
"url": "https://www.suse.com/security/cve/CVE-2022-33740"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-33740",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T09:26:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-33740"
},
{
"cve": "CVE-2022-33741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33741"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33741",
"url": "https://www.suse.com/security/cve/CVE-2022-33741"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-33741",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T09:26:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-33741"
},
{
"cve": "CVE-2022-33742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33742"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33742",
"url": "https://www.suse.com/security/cve/CVE-2022-33742"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-33742",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T09:26:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-33742"
},
{
"cve": "CVE-2022-33981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33981"
}
],
"notes": [
{
"category": "general",
"text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33981",
"url": "https://www.suse.com/security/cve/CVE-2022-33981"
},
{
"category": "external",
"summary": "SUSE Bug 1200692 for CVE-2022-33981",
"url": "https://bugzilla.suse.com/1200692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_127-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.127.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.127.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.127.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-13T09:26:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-33981"
}
]
}
suse-su-2022:3408-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim\u0027s TCP session (bnc#1196616).\n- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).\n- CVE-2022-1012: Fixed a memory leak problem that was found in the TCP source port generation algorithm in net/ipv4/tcp.c (bnc#1199482).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2022-21385: Fixed a flaw in net_rds_alloc_sgs() that allowed unprivileged local users to crash the machine (bnc#1202897).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).\n- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).\n- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).\n- CVE-2022-29581: Fixed improper update of reference count vulnerability in net/sched that allowed a local attacker to cause privilege escalation to root (bnc#1199665).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n\nThe following non-security bugs were fixed:\n\n- rpm: Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).\n- cifs: fix error paths in cifs_tree_connect() (bsc#1177440).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1188944).\n- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).\n- cifs: skip trailing separators of prefix paths (bsc#1188944).\n- kernel-obs-build: include qemu_fw_cfg (boo#1201705)\n- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).\n- md/bitmap: do not set sb values if can\u0027t pass sanity check (bsc#1197158).\n- mm/rmap.c: do not reuse anon_vma if we just want a copy (git-fixes, bsc#1203098).\n- mm/rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse (git-fixes, bsc#1203098). \n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- objtool: Add --backtrace support (bsc#1202396).\n- objtool: Add support for intra-function calls (bsc#1202396).\n- objtool: Allow no-op CFI ops in alternatives (bsc#1202396).\n- objtool: Convert insn type to enum (bsc#1202396).\n- objtool: Do not use ignore flag for fake jumps (bsc#1202396).\n- objtool: Fix !CFI insn_state propagation (bsc#1202396).\n- objtool: Fix ORC vs alternatives (bsc#1202396).\n- objtool: Fix sibling call detection (bsc#1202396).\n- objtool: Make handle_insn_ops() unconditional (bsc#1202396).\n- objtool: Remove INSN_STACK (bsc#1202396).\n- objtool: Remove check preventing branches within alternative (bsc#1202396).\n- objtool: Rename elf_open() to prevent conflict with libelf from elftoolchain (bsc#1202396).\n- objtool: Rename struct cfi_state (bsc#1202396).\n- objtool: Rework allocating stack_ops on decode (bsc#1202396).\n- objtool: Rewrite alt-\u003eskip_orig (bsc#1202396).\n- objtool: Set insn-\u003efunc for alternatives (bsc#1202396).\n- objtool: Support conditional retpolines (bsc#1202396).\n- objtool: Support multiple stack_op per instruction (bsc#1202396).\n- objtool: Track original function across branches (bsc#1202396).\n- objtool: Uniquely identify alternative instruction groups (bsc#1202396).\n- objtool: Use Elf_Scn typedef instead of assuming struct name (bsc#1202396).\n- tcp: add some entropy in __inet_hash_connect() (bsc#1180153 bsc#1202335).\n- tcp: change source port randomizarion at connect() time (bsc#1180153 bsc#1202335).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3408,SUSE-SLE-Module-Live-Patching-15-SP1-2022-3408,SUSE-SLE-Product-HA-15-SP1-2022-3408,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-3408,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-3408,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-3408,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-3408,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-3408,SUSE-Storage-6-2022-3408,openSUSE-SLE-15.3-2022-3408,openSUSE-SLE-15.4-2022-3408",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3408-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3408-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223408-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3408-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html"
},
{
"category": "self",
"summary": "SUSE Bug 1177440",
"url": "https://bugzilla.suse.com/1177440"
},
{
"category": "self",
"summary": "SUSE Bug 1180153",
"url": "https://bugzilla.suse.com/1180153"
},
{
"category": "self",
"summary": "SUSE Bug 1188944",
"url": "https://bugzilla.suse.com/1188944"
},
{
"category": "self",
"summary": "SUSE Bug 1191881",
"url": "https://bugzilla.suse.com/1191881"
},
{
"category": "self",
"summary": "SUSE Bug 1194535",
"url": "https://bugzilla.suse.com/1194535"
},
{
"category": "self",
"summary": "SUSE Bug 1196616",
"url": "https://bugzilla.suse.com/1196616"
},
{
"category": "self",
"summary": "SUSE Bug 1197158",
"url": "https://bugzilla.suse.com/1197158"
},
{
"category": "self",
"summary": "SUSE Bug 1199482",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "self",
"summary": "SUSE Bug 1199665",
"url": "https://bugzilla.suse.com/1199665"
},
{
"category": "self",
"summary": "SUSE Bug 1201019",
"url": "https://bugzilla.suse.com/1201019"
},
{
"category": "self",
"summary": "SUSE Bug 1201420",
"url": "https://bugzilla.suse.com/1201420"
},
{
"category": "self",
"summary": "SUSE Bug 1201705",
"url": "https://bugzilla.suse.com/1201705"
},
{
"category": "self",
"summary": "SUSE Bug 1201726",
"url": "https://bugzilla.suse.com/1201726"
},
{
"category": "self",
"summary": "SUSE Bug 1201948",
"url": "https://bugzilla.suse.com/1201948"
},
{
"category": "self",
"summary": "SUSE Bug 1202096",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "self",
"summary": "SUSE Bug 1202097",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "self",
"summary": "SUSE Bug 1202154",
"url": "https://bugzilla.suse.com/1202154"
},
{
"category": "self",
"summary": "SUSE Bug 1202335",
"url": "https://bugzilla.suse.com/1202335"
},
{
"category": "self",
"summary": "SUSE Bug 1202346",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "self",
"summary": "SUSE Bug 1202347",
"url": "https://bugzilla.suse.com/1202347"
},
{
"category": "self",
"summary": "SUSE Bug 1202393",
"url": "https://bugzilla.suse.com/1202393"
},
{
"category": "self",
"summary": "SUSE Bug 1202396",
"url": "https://bugzilla.suse.com/1202396"
},
{
"category": "self",
"summary": "SUSE Bug 1202672",
"url": "https://bugzilla.suse.com/1202672"
},
{
"category": "self",
"summary": "SUSE Bug 1202897",
"url": "https://bugzilla.suse.com/1202897"
},
{
"category": "self",
"summary": "SUSE Bug 1202898",
"url": "https://bugzilla.suse.com/1202898"
},
{
"category": "self",
"summary": "SUSE Bug 1203098",
"url": "https://bugzilla.suse.com/1203098"
},
{
"category": "self",
"summary": "SUSE Bug 1203107",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36516 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4203 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1012 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20368 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20369 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21385 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2588 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26373 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2639 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2663 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29581 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29581/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2977 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2977/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3028 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36879 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36879/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39188 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39188/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-09-26T16:42:10Z",
"generator": {
"date": "2022-09-26T16:42:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3408-1",
"initial_release_date": "2022-09-26T16:42:10Z",
"revision_history": [
{
"date": "2022-09-26T16:42:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-150100.197.123.1.aarch64",
"product_id": "kernel-default-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"product_id": "kernel-default-base-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.123.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.123.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.123.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150100.197.123.1.aarch64",
"product_id": "kernel-syms-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.123.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150100.197.123.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-150100.197.123.1.noarch",
"product_id": "kernel-devel-4.12.14-150100.197.123.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150100.197.123.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-150100.197.123.1.noarch",
"product_id": "kernel-docs-4.12.14-150100.197.123.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150100.197.123.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150100.197.123.1.noarch",
"product_id": "kernel-docs-html-4.12.14-150100.197.123.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150100.197.123.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-150100.197.123.1.noarch",
"product_id": "kernel-macros-4.12.14-150100.197.123.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150100.197.123.1.noarch",
"product": {
"name": "kernel-source-4.12.14-150100.197.123.1.noarch",
"product_id": "kernel-source-4.12.14-150100.197.123.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150100.197.123.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150100.197.123.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150100.197.123.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-debug-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-default-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-syms-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-default-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-default-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-default-base-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-default-devel-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-default-extra-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-default-man-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-obs-build-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-syms-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-vanilla-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.123.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-debug-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-default-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-default-base-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-syms-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.123.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 6",
"product": {
"name": "SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.123.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.123.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.123.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-default-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150100.197.123.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.123.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.123.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.123.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.123.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.123.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.123.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.123.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.123.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.123.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.123.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.123.1.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.123.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.123.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.123.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.123.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.123.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150100.197.123.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.123.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.123.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.123.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.123.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.123.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.123.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150100.197.123.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.123.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.123.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.123.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.123.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
},
"product_reference": "kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36516"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim\u0027s TCP session or terminate that session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36516",
"url": "https://www.suse.com/security/cve/CVE-2020-36516"
},
{
"category": "external",
"summary": "SUSE Bug 1196616 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1196616"
},
{
"category": "external",
"summary": "SUSE Bug 1196867 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1196867"
},
{
"category": "external",
"summary": "SUSE Bug 1204092 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1204092"
},
{
"category": "external",
"summary": "SUSE Bug 1204183 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1204183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-26T16:42:10Z",
"details": "important"
}
],
"title": "CVE-2020-36516"
},
{
"cve": "CVE-2021-4203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4203"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4203",
"url": "https://www.suse.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "SUSE Bug 1194535 for CVE-2021-4203",
"url": "https://bugzilla.suse.com/1194535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-26T16:42:10Z",
"details": "moderate"
}
],
"title": "CVE-2021-4203"
},
{
"cve": "CVE-2022-1012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1012"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1012",
"url": "https://www.suse.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "SUSE Bug 1199482 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "external",
"summary": "SUSE Bug 1199694 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199694"
},
{
"category": "external",
"summary": "SUSE Bug 1202335 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1202335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-26T16:42:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-20368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20368"
}
],
"notes": [
{
"category": "general",
"text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20368",
"url": "https://www.suse.com/security/cve/CVE-2022-20368"
},
{
"category": "external",
"summary": "SUSE Bug 1202346 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "external",
"summary": "SUSE Bug 1212311 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1212311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-26T16:42:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-20369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20369"
}
],
"notes": [
{
"category": "general",
"text": "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20369",
"url": "https://www.suse.com/security/cve/CVE-2022-20369"
},
{
"category": "external",
"summary": "SUSE Bug 1202347 for CVE-2022-20369",
"url": "https://bugzilla.suse.com/1202347"
},
{
"category": "external",
"summary": "SUSE Bug 1212321 for CVE-2022-20369",
"url": "https://bugzilla.suse.com/1212321"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-26T16:42:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-20369"
},
{
"cve": "CVE-2022-21385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21385"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in net_rds_alloc_sgs() in Oracle Linux kernels allows unprivileged local users to crash the machine. CVSS 3.1 Base Score 6.2 (Availability impacts). CVSS Vector (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21385",
"url": "https://www.suse.com/security/cve/CVE-2022-21385"
},
{
"category": "external",
"summary": "SUSE Bug 1202897 for CVE-2022-21385",
"url": "https://bugzilla.suse.com/1202897"
},
{
"category": "external",
"summary": "SUSE Bug 1212285 for CVE-2022-21385",
"url": "https://bugzilla.suse.com/1212285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-26T16:42:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-21385"
},
{
"cve": "CVE-2022-2588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2588"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2588",
"url": "https://www.suse.com/security/cve/CVE-2022-2588"
},
{
"category": "external",
"summary": "SUSE Bug 1202096 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "external",
"summary": "SUSE Bug 1203613 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1203613"
},
{
"category": "external",
"summary": "SUSE Bug 1204183 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1204183"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-26T16:42:10Z",
"details": "important"
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-26373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26373"
}
],
"notes": [
{
"category": "general",
"text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26373",
"url": "https://www.suse.com/security/cve/CVE-2022-26373"
},
{
"category": "external",
"summary": "SUSE Bug 1201726 for CVE-2022-26373",
"url": "https://bugzilla.suse.com/1201726"
},
{
"category": "external",
"summary": "SUSE Bug 1209619 for CVE-2022-26373",
"url": "https://bugzilla.suse.com/1209619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-26T16:42:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2639"
}
],
"notes": [
{
"category": "general",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2639",
"url": "https://www.suse.com/security/cve/CVE-2022-2639"
},
{
"category": "external",
"summary": "SUSE Bug 1202154 for CVE-2022-2639",
"url": "https://bugzilla.suse.com/1202154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-26T16:42:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-2663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2663"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2663",
"url": "https://www.suse.com/security/cve/CVE-2022-2663"
},
{
"category": "external",
"summary": "SUSE Bug 1202097 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "external",
"summary": "SUSE Bug 1212299 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1212299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-26T16:42:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-29581",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29581"
}
],
"notes": [
{
"category": "general",
"text": "Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29581",
"url": "https://www.suse.com/security/cve/CVE-2022-29581"
},
{
"category": "external",
"summary": "SUSE Bug 1199665 for CVE-2022-29581",
"url": "https://bugzilla.suse.com/1199665"
},
{
"category": "external",
"summary": "SUSE Bug 1199695 for CVE-2022-29581",
"url": "https://bugzilla.suse.com/1199695"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-29581",
"url": "https://bugzilla.suse.com/1205313"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-26T16:42:10Z",
"details": "important"
}
],
"title": "CVE-2022-29581"
},
{
"cve": "CVE-2022-2977",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2977"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2977",
"url": "https://www.suse.com/security/cve/CVE-2022-2977"
},
{
"category": "external",
"summary": "SUSE Bug 1202672 for CVE-2022-2977",
"url": "https://bugzilla.suse.com/1202672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-26T16:42:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-2977"
},
{
"cve": "CVE-2022-3028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3028"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3028",
"url": "https://www.suse.com/security/cve/CVE-2022-3028"
},
{
"category": "external",
"summary": "SUSE Bug 1202898 for CVE-2022-3028",
"url": "https://bugzilla.suse.com/1202898"
},
{
"category": "external",
"summary": "SUSE Bug 1212296 for CVE-2022-3028",
"url": "https://bugzilla.suse.com/1212296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-26T16:42:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-36879",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36879"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36879",
"url": "https://www.suse.com/security/cve/CVE-2022-36879"
},
{
"category": "external",
"summary": "SUSE Bug 1201948 for CVE-2022-36879",
"url": "https://bugzilla.suse.com/1201948"
},
{
"category": "external",
"summary": "SUSE Bug 1212327 for CVE-2022-36879",
"url": "https://bugzilla.suse.com/1212327"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-26T16:42:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-39188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39188"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39188",
"url": "https://www.suse.com/security/cve/CVE-2022-39188"
},
{
"category": "external",
"summary": "SUSE Bug 1203107 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "external",
"summary": "SUSE Bug 1203116 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203116"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212326 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1212326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_123-default-1-150100.3.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.123.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.123.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.123.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.123.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-26T16:42:10Z",
"details": "moderate"
}
],
"title": "CVE-2022-39188"
}
]
}
suse-su-2022:3450-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-39188: Fixed race condition in include/asm-generic/tlb.h where a device driver can free a page while it still has stale TLB entries (bnc#1203107).\n- CVE-2022-2663: Fixed an issue that was found in nf_conntrack_irc where the message handling could be confused and incorrectly matches the message (bnc#1202097).\n- CVE-2022-3028: Fixed race condition that was found in the IP framework for transforming packets (XFRM subsystem) (bnc#1202898).\n- CVE-2020-27784: Fixed a vulnerability that was found in printer_ioctl() printer_ioctl() when accessing a deallocated instance (bnc#1202895).\n- CVE-2021-4155: Fixed a data leak flaw that was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem (bnc#1194272).\n- CVE-2022-2905: Fixed tnum_range usage on array range checking for poke descriptors (bsc#1202564, bsc#1202860).\n- CVE-2022-2977: Fixed reference counting for struct tpm_chip (bsc#1202672).\n- CVE-2021-4203: Fixed use-after-free read flaw that was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (bnc#1194535).\n- CVE-2022-2588: Fixed use-after-free in cls_route (bsc#1202096).\n- CVE-2022-1012: Fixed a memory leak problem that was found in the TCP source port generation algorithm in net/ipv4/tcp.c (bnc#1199482).\n- CVE-2022-36879: Fixed an issue in xfrm_expand_policies in net/xfrm/xfrm_policy.c where a refcount could be dropped twice (bnc#1201948).\n- CVE-2022-20368: Fixed slab-out-of-bounds access in packet_recvmsg() (bsc#1202346).\n- CVE-2022-20369: Fixed out of bounds write in v4l2_m2m_querybuf of v4l2-mem2mem.c (bnc#1202347).\n- CVE-2022-26373: Fixed non-transparent sharing of return predictor targets between contexts in some Intel Processors (bnc#1201726).\n- CVE-2016-3695: Fixed an issue inside the einj_error_inject function in drivers/acpi/apei/einj.c that allowed users to simulate hardware errors and consequently cause a denial of service (bnc#1023051).\n- CVE-2022-2639: Fixed an integer coercion error that was found in the openvswitch kernel module (bnc#1202154).\n- CVE-2020-36516: Fixed an issue in the mixed IPID assignment method where an attacker was able to inject data into or terminate a victim\u0027s TCP session (bnc#1196616).\n- CVE-2022-32250: Fixed a privilege escalation issue in net/netfilter/nf_tables_api.c that allowed a local user to became root (bnc#1200015)\n- CVE-2022-29581: Fixed improper update of reference count vulnerability in net/sched that allowed a local attacker to cause privilege escalation to root (bnc#1199665).\n- CVE-2022-20166: Fixed possible out of bounds write due to a heap buffer overflow in various methods of kernel base drivers (bnc#1200598).\n\nThe following non-security bugs were fixed:\n\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1188944).\n- cifs: skip trailing separators of prefix paths (bsc#1188944).\n- config: Update files NVRAM=y (bsc#1201361 bsc#1192968).\n- kernel-obs-build: include qemu_fw_cfg (boo#1201705)\n- lightnvm: Remove lightnvm implemenation (bsc#1191881 bsc#1201420 ZDI-CAN-17325).\n- md/bitmap: do not set sb values if can\u0027t pass sanity check (bsc#1197158).\n- mm/rmap: Fix anon_vma-\u003edegree ambiguity leading to double-reuse (git-fixes, bsc#1203098).\n- mm: pagewalk: Fix race between unmap and page walker (git-fixes, bsc#1203159).\n- net_sched: cls_route: disallow handle of 0 (bsc#1202393).\n- objtool: Add support for intra-function calls (bsc#1202396).\n- objtool: Make handle_insn_ops() unconditional (bsc#1202396).\n- objtool: Remove INSN_STACK (bsc#1202396).\n- objtool: Rework allocating stack_ops on decode (bsc#1202396).\n- objtool: Support multiple stack_op per instruction (bsc#1202396).\n- rpm: Fix parsing of rpm/macros.kernel-source on SLE12 (bsc#1201019).\n- tcp: add some entropy in __inet_hash_connect() (bsc#1180153).\n- tcp: change source port randomizarion at connect() time (bsc#1180153).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3450,SUSE-SLE-Module-Live-Patching-15-SP2-2022-3450,SUSE-SLE-Product-HA-15-SP2-2022-3450,SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-3450,SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-3450,SUSE-SLE-Product-SLES-15-SP2-BCL-2022-3450,SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-3450,SUSE-SLE-Product-SLES_SAP-15-SP2-2022-3450,SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-3450,SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-3450,SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-3450,SUSE-Storage-7-2022-3450",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3450-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3450-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223450-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3450-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html"
},
{
"category": "self",
"summary": "SUSE Bug 1023051",
"url": "https://bugzilla.suse.com/1023051"
},
{
"category": "self",
"summary": "SUSE Bug 1180153",
"url": "https://bugzilla.suse.com/1180153"
},
{
"category": "self",
"summary": "SUSE Bug 1188944",
"url": "https://bugzilla.suse.com/1188944"
},
{
"category": "self",
"summary": "SUSE Bug 1191881",
"url": "https://bugzilla.suse.com/1191881"
},
{
"category": "self",
"summary": "SUSE Bug 1192968",
"url": "https://bugzilla.suse.com/1192968"
},
{
"category": "self",
"summary": "SUSE Bug 1194272",
"url": "https://bugzilla.suse.com/1194272"
},
{
"category": "self",
"summary": "SUSE Bug 1194535",
"url": "https://bugzilla.suse.com/1194535"
},
{
"category": "self",
"summary": "SUSE Bug 1196616",
"url": "https://bugzilla.suse.com/1196616"
},
{
"category": "self",
"summary": "SUSE Bug 1197158",
"url": "https://bugzilla.suse.com/1197158"
},
{
"category": "self",
"summary": "SUSE Bug 1199482",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "self",
"summary": "SUSE Bug 1199665",
"url": "https://bugzilla.suse.com/1199665"
},
{
"category": "self",
"summary": "SUSE Bug 1201726",
"url": "https://bugzilla.suse.com/1201726"
},
{
"category": "self",
"summary": "SUSE Bug 1201948",
"url": "https://bugzilla.suse.com/1201948"
},
{
"category": "self",
"summary": "SUSE Bug 1202096",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "self",
"summary": "SUSE Bug 1202097",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "self",
"summary": "SUSE Bug 1202154",
"url": "https://bugzilla.suse.com/1202154"
},
{
"category": "self",
"summary": "SUSE Bug 1202346",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "self",
"summary": "SUSE Bug 1202347",
"url": "https://bugzilla.suse.com/1202347"
},
{
"category": "self",
"summary": "SUSE Bug 1202393",
"url": "https://bugzilla.suse.com/1202393"
},
{
"category": "self",
"summary": "SUSE Bug 1202396",
"url": "https://bugzilla.suse.com/1202396"
},
{
"category": "self",
"summary": "SUSE Bug 1202564",
"url": "https://bugzilla.suse.com/1202564"
},
{
"category": "self",
"summary": "SUSE Bug 1202672",
"url": "https://bugzilla.suse.com/1202672"
},
{
"category": "self",
"summary": "SUSE Bug 1202860",
"url": "https://bugzilla.suse.com/1202860"
},
{
"category": "self",
"summary": "SUSE Bug 1202895",
"url": "https://bugzilla.suse.com/1202895"
},
{
"category": "self",
"summary": "SUSE Bug 1202898",
"url": "https://bugzilla.suse.com/1202898"
},
{
"category": "self",
"summary": "SUSE Bug 1203098",
"url": "https://bugzilla.suse.com/1203098"
},
{
"category": "self",
"summary": "SUSE Bug 1203107",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "self",
"summary": "SUSE Bug 1203159",
"url": "https://bugzilla.suse.com/1203159"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3695 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3695/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27784 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27784/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36516 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4155 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4203 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1012 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20166 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20368 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20369 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20369/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2588 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2588/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26373 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26373/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2639 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2663 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2663/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2905 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2905/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29581 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29581/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2977 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2977/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3028 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-32250 page",
"url": "https://www.suse.com/security/cve/CVE-2022-32250/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36879 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36879/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-39188 page",
"url": "https://www.suse.com/security/cve/CVE-2022-39188/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-09-28T06:48:59Z",
"generator": {
"date": "2022-09-28T06:48:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3450-1",
"initial_release_date": "2022-09-28T06:48:59Z",
"revision_history": [
{
"date": "2022-09-28T06:48:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-150200.24.129.1.aarch64",
"product_id": "kernel-default-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"product_id": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.129.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.129.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.129.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"product_id": "kernel-preempt-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150200.24.129.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-150200.24.129.1.aarch64",
"product_id": "kernel-syms-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.129.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-150200.24.129.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-150200.24.129.1.noarch",
"product_id": "kernel-devel-5.3.18-150200.24.129.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-150200.24.129.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-150200.24.129.1.noarch",
"product_id": "kernel-docs-5.3.18-150200.24.129.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-150200.24.129.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-150200.24.129.1.noarch",
"product_id": "kernel-docs-html-5.3.18-150200.24.129.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-150200.24.129.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-150200.24.129.1.noarch",
"product_id": "kernel-macros-5.3.18-150200.24.129.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-150200.24.129.1.noarch",
"product": {
"name": "kernel-source-5.3.18-150200.24.129.1.noarch",
"product_id": "kernel-source-5.3.18-150200.24.129.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-150200.24.129.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-150200.24.129.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-150200.24.129.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-150200.24.129.1.ppc64le",
"product_id": "kernel-debug-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-150200.24.129.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-150200.24.129.1.ppc64le",
"product_id": "kernel-default-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.129.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-150200.24.129.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.129.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"product_id": "kernel-syms-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-150200.24.129.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.129.1.s390x",
"product": {
"name": "kernel-default-5.3.18-150200.24.129.1.s390x",
"product_id": "kernel-default-5.3.18-150200.24.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"product_id": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"product_id": "kernel-default-devel-5.3.18-150200.24.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.129.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.129.1.s390x",
"product_id": "kernel-default-extra-5.3.18-150200.24.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"product_id": "kernel-obs-build-5.3.18-150200.24.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.129.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.129.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-150200.24.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.129.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-150200.24.129.1.s390x",
"product_id": "kernel-syms-5.3.18-150200.24.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-150200.24.129.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-150200.24.129.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-150200.24.129.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.129.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.129.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.129.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-debug-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-default-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"product_id": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_129-preempt-1-150200.5.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_129-preempt-1-150200.5.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_129-preempt-1-150200.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-preempt-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
"product_id": "kernel-syms-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.129.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.129.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-retail-branch-server:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7",
"product": {
"name": "SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Proxy 4.1",
"product_id": "SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Retail Branch Server 4.1",
"product_id": "SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Retail Branch Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Manager Server 4.1",
"product_id": "SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.129.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.129.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.129.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.129.1.noarch as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.129.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64 as component of SUSE Enterprise Storage 7",
"product_id": "SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3695",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3695"
}
],
"notes": [
{
"category": "general",
"text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3695",
"url": "https://www.suse.com/security/cve/CVE-2016-3695"
},
{
"category": "external",
"summary": "SUSE Bug 1023051 for CVE-2016-3695",
"url": "https://bugzilla.suse.com/1023051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "low"
}
],
"title": "CVE-2016-3695"
},
{
"cve": "CVE-2020-27784",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27784"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27784",
"url": "https://www.suse.com/security/cve/CVE-2020-27784"
},
{
"category": "external",
"summary": "SUSE Bug 1202895 for CVE-2020-27784",
"url": "https://bugzilla.suse.com/1202895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "low"
}
],
"title": "CVE-2020-27784"
},
{
"cve": "CVE-2020-36516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36516"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim\u0027s TCP session or terminate that session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36516",
"url": "https://www.suse.com/security/cve/CVE-2020-36516"
},
{
"category": "external",
"summary": "SUSE Bug 1196616 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1196616"
},
{
"category": "external",
"summary": "SUSE Bug 1196867 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1196867"
},
{
"category": "external",
"summary": "SUSE Bug 1204092 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1204092"
},
{
"category": "external",
"summary": "SUSE Bug 1204183 for CVE-2020-36516",
"url": "https://bugzilla.suse.com/1204183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "important"
}
],
"title": "CVE-2020-36516"
},
{
"cve": "CVE-2021-4155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4155"
}
],
"notes": [
{
"category": "general",
"text": "A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A local attacker could use this flaw to leak data on the XFS filesystem otherwise not accessible to them.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4155",
"url": "https://www.suse.com/security/cve/CVE-2021-4155"
},
{
"category": "external",
"summary": "SUSE Bug 1194272 for CVE-2021-4155",
"url": "https://bugzilla.suse.com/1194272"
},
{
"category": "external",
"summary": "SUSE Bug 1199255 for CVE-2021-4155",
"url": "https://bugzilla.suse.com/1199255"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2021-4155",
"url": "https://bugzilla.suse.com/1200084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "moderate"
}
],
"title": "CVE-2021-4155"
},
{
"cve": "CVE-2021-4203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4203"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4203",
"url": "https://www.suse.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "SUSE Bug 1194535 for CVE-2021-4203",
"url": "https://bugzilla.suse.com/1194535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "moderate"
}
],
"title": "CVE-2021-4203"
},
{
"cve": "CVE-2022-1012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1012"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1012",
"url": "https://www.suse.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "SUSE Bug 1199482 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "external",
"summary": "SUSE Bug 1199694 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199694"
},
{
"category": "external",
"summary": "SUSE Bug 1202335 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1202335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "moderate"
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-20166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20166"
}
],
"notes": [
{
"category": "general",
"text": "In various methods of kernel base drivers, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-182388481References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20166",
"url": "https://www.suse.com/security/cve/CVE-2022-20166"
},
{
"category": "external",
"summary": "SUSE Bug 1200598 for CVE-2022-20166",
"url": "https://bugzilla.suse.com/1200598"
},
{
"category": "external",
"summary": "SUSE Bug 1212284 for CVE-2022-20166",
"url": "https://bugzilla.suse.com/1212284"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "moderate"
}
],
"title": "CVE-2022-20166"
},
{
"cve": "CVE-2022-20368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20368"
}
],
"notes": [
{
"category": "general",
"text": "Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20368",
"url": "https://www.suse.com/security/cve/CVE-2022-20368"
},
{
"category": "external",
"summary": "SUSE Bug 1202346 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1202346"
},
{
"category": "external",
"summary": "SUSE Bug 1212311 for CVE-2022-20368",
"url": "https://bugzilla.suse.com/1212311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "moderate"
}
],
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-20369",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20369"
}
],
"notes": [
{
"category": "general",
"text": "In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-223375145References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20369",
"url": "https://www.suse.com/security/cve/CVE-2022-20369"
},
{
"category": "external",
"summary": "SUSE Bug 1202347 for CVE-2022-20369",
"url": "https://bugzilla.suse.com/1202347"
},
{
"category": "external",
"summary": "SUSE Bug 1212321 for CVE-2022-20369",
"url": "https://bugzilla.suse.com/1212321"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "moderate"
}
],
"title": "CVE-2022-20369"
},
{
"cve": "CVE-2022-2588",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2588"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2588",
"url": "https://www.suse.com/security/cve/CVE-2022-2588"
},
{
"category": "external",
"summary": "SUSE Bug 1202096 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1202096"
},
{
"category": "external",
"summary": "SUSE Bug 1203613 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1203613"
},
{
"category": "external",
"summary": "SUSE Bug 1204183 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1204183"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-2588",
"url": "https://bugzilla.suse.com/1209225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "important"
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-26373",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26373"
}
],
"notes": [
{
"category": "general",
"text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26373",
"url": "https://www.suse.com/security/cve/CVE-2022-26373"
},
{
"category": "external",
"summary": "SUSE Bug 1201726 for CVE-2022-26373",
"url": "https://bugzilla.suse.com/1201726"
},
{
"category": "external",
"summary": "SUSE Bug 1209619 for CVE-2022-26373",
"url": "https://bugzilla.suse.com/1209619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "moderate"
}
],
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2639"
}
],
"notes": [
{
"category": "general",
"text": "An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2639",
"url": "https://www.suse.com/security/cve/CVE-2022-2639"
},
{
"category": "external",
"summary": "SUSE Bug 1202154 for CVE-2022-2639",
"url": "https://bugzilla.suse.com/1202154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "moderate"
}
],
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-2663",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2663"
}
],
"notes": [
{
"category": "general",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2663",
"url": "https://www.suse.com/security/cve/CVE-2022-2663"
},
{
"category": "external",
"summary": "SUSE Bug 1202097 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1202097"
},
{
"category": "external",
"summary": "SUSE Bug 1212299 for CVE-2022-2663",
"url": "https://bugzilla.suse.com/1212299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "moderate"
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-2905",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2905"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2905",
"url": "https://www.suse.com/security/cve/CVE-2022-2905"
},
{
"category": "external",
"summary": "SUSE Bug 1202860 for CVE-2022-2905",
"url": "https://bugzilla.suse.com/1202860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "moderate"
}
],
"title": "CVE-2022-2905"
},
{
"cve": "CVE-2022-29581",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29581"
}
],
"notes": [
{
"category": "general",
"text": "Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29581",
"url": "https://www.suse.com/security/cve/CVE-2022-29581"
},
{
"category": "external",
"summary": "SUSE Bug 1199665 for CVE-2022-29581",
"url": "https://bugzilla.suse.com/1199665"
},
{
"category": "external",
"summary": "SUSE Bug 1199695 for CVE-2022-29581",
"url": "https://bugzilla.suse.com/1199695"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-29581",
"url": "https://bugzilla.suse.com/1205313"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "important"
}
],
"title": "CVE-2022-29581"
},
{
"cve": "CVE-2022-2977",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2977"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2977",
"url": "https://www.suse.com/security/cve/CVE-2022-2977"
},
{
"category": "external",
"summary": "SUSE Bug 1202672 for CVE-2022-2977",
"url": "https://bugzilla.suse.com/1202672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "moderate"
}
],
"title": "CVE-2022-2977"
},
{
"cve": "CVE-2022-3028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3028"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3028",
"url": "https://www.suse.com/security/cve/CVE-2022-3028"
},
{
"category": "external",
"summary": "SUSE Bug 1202898 for CVE-2022-3028",
"url": "https://bugzilla.suse.com/1202898"
},
{
"category": "external",
"summary": "SUSE Bug 1212296 for CVE-2022-3028",
"url": "https://bugzilla.suse.com/1212296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "moderate"
}
],
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-32250",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-32250"
}
],
"notes": [
{
"category": "general",
"text": "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-32250",
"url": "https://www.suse.com/security/cve/CVE-2022-32250"
},
{
"category": "external",
"summary": "SUSE Bug 1200015 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "external",
"summary": "SUSE Bug 1200268 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1200268"
},
{
"category": "external",
"summary": "SUSE Bug 1200494 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1200494"
},
{
"category": "external",
"summary": "SUSE Bug 1202992 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1202992"
},
{
"category": "external",
"summary": "SUSE Bug 1202993 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1202993"
},
{
"category": "external",
"summary": "SUSE Bug 1203002 for CVE-2022-32250",
"url": "https://bugzilla.suse.com/1203002"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "important"
}
],
"title": "CVE-2022-32250"
},
{
"cve": "CVE-2022-36879",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36879"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36879",
"url": "https://www.suse.com/security/cve/CVE-2022-36879"
},
{
"category": "external",
"summary": "SUSE Bug 1201948 for CVE-2022-36879",
"url": "https://bugzilla.suse.com/1201948"
},
{
"category": "external",
"summary": "SUSE Bug 1212327 for CVE-2022-36879",
"url": "https://bugzilla.suse.com/1212327"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "moderate"
}
],
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-39188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-39188"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-39188",
"url": "https://www.suse.com/security/cve/CVE-2022-39188"
},
{
"category": "external",
"summary": "SUSE Bug 1203107 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203107"
},
{
"category": "external",
"summary": "SUSE Bug 1203116 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1203116"
},
{
"category": "external",
"summary": "SUSE Bug 1205313 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1205313"
},
{
"category": "external",
"summary": "SUSE Bug 1209225 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1209225"
},
{
"category": "external",
"summary": "SUSE Bug 1212326 for CVE-2022-39188",
"url": "https://bugzilla.suse.com/1212326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Enterprise Storage 7:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_129-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-BCL:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Proxy 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Proxy 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Retail Branch Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Retail Branch Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.s390x",
"SUSE Manager Server 4.1:kernel-default-base-5.3.18-150200.24.129.1.150200.9.61.1.x86_64",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-default-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-devel-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-docs-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-macros-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-obs-build-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-preempt-devel-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:kernel-source-5.3.18-150200.24.129.1.noarch",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:kernel-syms-5.3.18-150200.24.129.1.x86_64",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.ppc64le",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.s390x",
"SUSE Manager Server 4.1:reiserfs-kmp-default-5.3.18-150200.24.129.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-28T06:48:59Z",
"details": "moderate"
}
],
"title": "CVE-2022-39188"
}
]
}
suse-su-2022:2520-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP4 kernel was updated.\n\nThe following security bugs were fixed:\n\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n- CVE-2022-2318: Fixed a use-after-free vulnerabilities in the timer handler in net/rose/rose_timer.c that allow attackers to crash the system without any privileges (bsc#1201251).\n- CVE-2022-1462: Fixed an out-of-bounds read flaw in the TeleTYpe subsystem (bnc#1198829).\n- CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742: Fixed multiple potential data leaks with Block and Network devices when using untrusted backends (bsc#1200762).\n- CVE-2022-33743: Fixed a Denial of Service related to XDP (bsc#1200763).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bnc#1199487).\n- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bnc#1200619).\n- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)\n- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).\n- CVE-2022-1998: Fixed a use after free in the file system notify functionality (bnc#1200284).\n- CVE-2022-1966: Fixed a use-after-free vulnerability in the Netfilter subsystem. This flaw allowed a local attacker with user access to cause a privilege escalation issue. (bnc#1200015)\n- CVE-2022-1852: Fixed a null-ptr-deref in the kvm module which can lead to DoS. (bsc#1199875)\n- CVE-2022-1789: Fixed a NULL pointer dereference when shadow paging is enabled. (bnc#1199674)\n- CVE-2022-1508: Fixed an out-of-bounds read flaw that could cause the system to crash. (bsc#1198968)\n- CVE-2022-1671: Fixed a null-ptr-deref bugs in net/rxrpc/server_key.c, unprivileged users could easily trigger it via ioctl. (bsc#1199439)\n- CVE-2022-1651: Fixed a bug in ACRN Device Model emulates virtual NICs in VM. This flaw may allow a local privileged attacker to leak kernel unauthorized information and also cause a denial of service problem. (bsc#1199433)\n- CVE-2022-29582: Fixed a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently. (bnc#1198811)\n- CVE-2022-0494: Fixed a kernel information leak flaw in the scsi_ioctl function. This flaw allowed a local attacker with a special user privilege to create issues with confidentiality. (bnc#1197386)\n- CVE-2021-4204: Fixed a vulnerability that allows local attackers to escalate privileges on affected installations via ebpf. (bnc#1194111)\n- CVE-2022-23222: Fixed a bug that allowed local users to gain privileges. (bnc#1194765)\n- CVE-2022-0264: Fixed a vulnerability in the Linux kernel\u0027s eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. (bnc#1194826)\n- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)\n- CVE-2022-1205: Fixed null pointer dereference and use-after-free vulnerabilities that allow an attacker to crash the linux kernel by simulating Amateur Radio. (bsc#1198027)\n- CVE-2022-1198: Fixed an use-after-free vulnerability that allow an attacker to crash the linux kernel by simulating Amateur Radio (bsc#1198030).\n- CVE-2022-1972: Fixed a buffer overflow in nftable that could lead to privilege escalation. (bsc#1200019)\n- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).\n- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).\n- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).\n- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).\n- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)\n- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it\u0027s been trivial to break out of it with kgdb or kdb. (bsc#1199426)\n- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)\n- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)\n- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).\n- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)\n- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)\n- CVE-2021-45402: The check_alu_op function in kernel/bpf/verifier.c did not properly update bounds while handling the mov32 instruction, which allowed local users to obtain potentially sensitive address information (bsc#1196130).\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: fix return value of __setup handlers (git-fixes).\n- ACPI/APEI: Limit printable size of BERT table data (git-fixes).\n- ACPI: battery: Add device HID and quirk for Microsoft Surface Go 3 (git-fixes).\n- ACPI: bus: Avoid using CPPC if not supported by firmware (bsc#1199793).\n- ACPICA: Avoid cache flush inside virtual machines (git-fixes).\n- ACPICA: Avoid walking the ACPI Namespace if it is not there (git-fixes).\n- ACPI: CPPC: Assume no transition latency if no PCCT (git-fixes).\n- ACPI: CPPC: Avoid out of bounds access when parsing _CPC data (git-fixes).\n- ACPI: docs: enumeration: Amend PWM enumeration ASL example (git-fixes).\n- ACPI: docs: enumeration: Discourage to use custom _DSM methods (git-fixes).\n- ACPI: docs: enumeration: Remove redundant .owner assignment (git-fixes).\n- ACPI: docs: enumeration: Update UART serial bus resource documentation (git-fixes).\n- ACPI/IORT: Check node revision for PMCG resources (git-fixes).\n- ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default (git-fixes).\n- ACPI: PM: Revert \u0027Only mark EC GPE for wakeup on Intel systems\u0027 (git-fixes).\n- ACPI: PM: s2idle: Cancel wakeup before dispatching EC GPE (git-fixes).\n- ACPI: processor idle: Allow playing dead in C3 state (git-fixes).\n- ACPI: processor: idle: Avoid falling back to C3 type C-states (git-fixes).\n- ACPI: processor idle: Check for architectural support for LPI (git-fixes).\n- ACPI: processor: idle: fix lockup regression on 32-bit ThinkPad T40 (git-fixes).\n- ACPI: properties: Consistently return -ENOENT if there are no more references (git-fixes).\n- ACPI: property: Release subnode properties with data nodes (git-fixes).\n- ACPI: sysfs: Fix BERT error region memory mapping (git-fixes).\n- ACPI: video: Change how we determine if brightness key-presses are handled (git-fixes).\n- ACPI: video: Force backlight native for Clevo NL5xRU and NL5xNU (git-fixes).\n- ACPI / x86: Work around broken XSDT on Advantech DAC-BJ01 board (git-fixes).\n- af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register (git-fixes).\n- aio: Fix incorrect usage of eventfd_signal_allowed() (git-fixes).\n- ALSA: cmipci: Restore aux vol on suspend/resume (git-fixes).\n- ALSA: core: Add snd_card_free_on_error() helper (git-fixes).\n- ALSA: cs4236: fix an incorrect NULL check on list iterator (git-fixes).\n- ALSA: ctxfi: Add SB046x PCI ID (git-fixes).\n- ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction (git-fixes).\n- ALSA: fireworks: fix wrong return count shorter than expected by 4 bytes (git-fixes).\n- ALSA: hda: Add AlderLake-PS variant PCI ID (git-fixes).\n- ALSA: hda: Add PCI and HDMI IDs for Intel Raptor Lake (git-fixes).\n- ALSA: hda: Avoid unsol event during RPM suspending (git-fixes).\n- ALSA: hda/conexant - Fix loopback issue with CX20632 (git-fixes).\n- ALSA: hda/conexant: Fix missing beep setup (git-fixes).\n- ALSA: hda: Fix discovery of i915 graphics PCI device (bsc#1200611).\n- ALSA: hda: Fix driver index handling at re-binding (git-fixes).\n- ALSA: hda: Fix missing codec probe on Shenker Dock 15 (git-fixes).\n- ALSA: hda: Fix regression on forced probe mask option (git-fixes).\n- ALSA: hda: Fix signedness of sscanf() arguments (git-fixes).\n- ALSA: hda - fix unused Realtek function when PM is not enabled (git-fixes).\n- ALSA: hda/hdmi: fix warning about PCM count when used with SOF (git-fixes).\n- ALSA: hda/i915: Fix one too many pci_dev_put() (git-fixes).\n- ALSA: hda/i915 - skip acomp init if no matching display (git-fixes).\n- ALSA: hda: intel-dspcfg: use SOF for UpExtreme and UpExtreme11 boards (git-fixes).\n- ALSA: hda: intel-dsp-config: update AlderLake PCI IDs (git-fixes).\n- ALSA: hda: intel-nhlt: remove use of __func__ in dev_dbg (git-fixes).\n- ALSA: hda/realtek: Add alc256-samsung-headphone fixup (git-fixes).\n- ALSA: hda/realtek - Add HW8326 support (git-fixes).\n- ALSA: hda/realtek: Add missing fixup-model entry for Gigabyte X570 ALC1220 quirks (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk for HP Omen laptop (git-fixes).\n- ALSA: hda/realtek - Add new type for ALC245 (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GA402 (git-fixes).\n- ALSA: hda/realtek: Add quirk for ASUS GU603 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP50PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNJ (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NP70PNP (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo NS50PU (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD50PNT (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).\n- ALSA: hda/realtek: Add quirk for Dell Latitude 7520 (git-fixes).\n- ALSA: hda/realtek: Add quirk for HP Dev One (git-fixes).\n- ALSA: hda/realtek: Add quirk for Legion Y9000X 2019 (git-fixes).\n- ALSA: hda/realtek: add quirk for Lenovo Thinkpad X12 speakers (git-fixes).\n- ALSA: hda/realtek: Add quirk for the Framework Laptop (git-fixes).\n- ALSA: hda/realtek: Add quirk for TongFang devices with pop noise (git-fixes).\n- ALSA: hda/realtek: Add quirk for Yoga Duet 7 13ITL6 speakers (git-fixes).\n- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).\n- ALSA: hda/realtek: Apply fixup for Lenovo Yoga Duet 7 properly (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9520 laptop (git-fixes).\n- ALSA: hda/realtek: Enable headset mic on Lenovo P360 (git-fixes).\n- ALSA: hda/realtek: Fix audio regression on Mi Notebook Pro 2020 (git-fixes).\n- ALSA: hda/realtek: Fix deadlock by COEF mutex (bsc#1195913).\n- ALSA: hda/realtek: Fix for quirk to enable speaker output on the Lenovo Yoga DuetITL 2021 (git-fixes).\n- ALSA: hda/realtek - Fix headset mic problem for a HP machine with alc671 (git-fixes).\n- ALSA: hda/realtek - Fix microphone noise on ASUS TUF B550M-PLUS (git-fixes).\n- ALSA: hda: realtek: Fix race at concurrent COEF updates (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (git-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570 Aorus Xtreme after reboot from Windows (git-fixes).\n- ALSA: hda/realtek: Fix silent output on Gigabyte X570S Aorus Master (newer chipset) (git-fixes).\n- ALSA: hda: Set max DMA segment size (git-fixes).\n- ALSA: hda: Skip codec shutdown in case the codec is not registered (git-fixes).\n- ALSA: hda/via: Fix missing beep setup (git-fixes).\n- ALSA: intel_hdmi: Fix reference to PCM buffer address (git-fixes).\n- ALSA: memalloc: Fix dma_need_sync() checks (bsc#1195913).\n- ALSA: memalloc: invalidate SG pages before sync (bsc#1195913).\n- ALSA: oss: Fix PCM OSS buffer allocation overflow (git-fixes).\n- ALSA: pci: fix reading of swapped values from pcmreg in AC97 codec (git-fixes).\n- ALSA: pcm: Add stream lock during PCM reset ioctl operations (git-fixes).\n- ALSA: pcm: Check for null pointer of pointer substream before dereferencing it (git-fixes).\n- ALSA: pcm: Fix races among concurrent hw_params and hw_free calls (git-fixes).\n- ALSA: pcm: Fix races among concurrent prealloc proc writes (git-fixes).\n- ALSA: pcm: Fix races among concurrent prepare and hw_params/hw_free calls (git-fixes).\n- ALSA: pcm: Fix races among concurrent read/write and buffer changes (git-fixes).\n- ALSA: pcm: Test for \u0027silence\u0027 field in struct \u0027pcm_format_data\u0027 (git-fixes).\n- ALSA: spi: Add check for clk_enable() (git-fixes).\n- ALSA: usb-audio: add mapping for MSI MAG X570S Torpedo MAX (git-fixes).\n- ALSA: usb-audio: add mapping for new Corsair Virtuoso SE (git-fixes).\n- ALSA: usb-audio: Add missing ep_idx in fixed EP quirks (git-fixes).\n- ALSA: usb-audio: Add mute TLV for playback volumes on RODE NT-USB (git-fixes).\n- ALSA: usb-audio: Add quirk bits for enabling/disabling generic implicit fb (git-fixes).\n- ALSA: usb-audio: Cancel pending work at closing a MIDI substream (git-fixes).\n- ALSA: usb-audio: Cap upper limits of buffer/period bytes for implicit fb (git-fixes).\n- ALSA: usb-audio: Clear MIDI port active flag after draining (git-fixes).\n- ALSA: usb-audio: Configure sync endpoints before data (git-fixes).\n- ALSA: usb-audio: Correct quirk for VF0770 (git-fixes).\n- ALSA: usb-audio: Do not abort resume upon errors (bsc#1195913).\n- ALSA: usb-audio: Do not get sample rate for MCT Trigger 5 USB-to-HDMI (git-fixes).\n- ALSA: usb-audio: Fix undefined behavior due to shift overflowing the constant (git-fixes).\n- ALSA: usb-audio: Increase max buffer size (git-fixes).\n- ALSA: usb-audio: initialize variables that could ignore errors (git-fixes).\n- ALSA: usb-audio: Limit max buffer and period sizes per time (git-fixes).\n- ALSA: usb-audio: Move generic implicit fb quirk entries into quirks.c (git-fixes).\n- ALSA: usb-audio: Optimize TEAC clock quirk (git-fixes).\n- ALSA: usb-audio: Restore Rane SL-1 quirk (git-fixes).\n- ALSA: usb-audio: revert to IMPLICIT_FB_FIXED_DEV for M-Audio FastTrack Ultra (git-fixes).\n- ALSA: usb-audio: Set up (implicit) sync for Saffire 6 (git-fixes).\n- ALSA: usb-audio: Skip generic sync EP parse for secondary EP (git-fixes).\n- ALSA: usb-audio: US16x08: Move overflow check before array access (git-fixes).\n- ALSA: usb-audio: Workaround for clock setup on TEAC devices (git-fixes).\n- ALSA: wavefront: Proper check of get_user() error (git-fixes).\n- ALSA: x86: intel_hdmi_audio: enable pm_runtime and set autosuspend delay (git-fixes).\n- ALSA: x86: intel_hdmi_audio: use pm_runtime_resume_and_get() (git-fixes).\n- alx: acquire mutex for alx_reinit in alx_change_mtu (git-fixes).\n- amd/display: set backlight only if required (git-fixes).\n- arch/arm64: Fix topology initialization for core scheduling (git-fixes).\n- arm64: Add Cortex-A510 CPU part definition (git-fixes).\n- arm64: Add part number for Arm Cortex-A78AE (git-fixes).\n- arm64: Add support for user sub-page fault probing (git-fixes)\n- arm64: alternatives: mark patch_alternative() as `noinstr` (git-fixes).\n- arm64: avoid fixmap race condition when create pud mapping (git-fixes).\n- arm64: compat: Do not treat syscall number as ESR_ELx for a bad syscall (git-fixes).\n- arm64: Correct wrong label in macro __init_el2_gicv3 (git-fixes).\n- arm64: defconfig: build imx-sdma as a module (git-fixes).\n- arm64: do not abuse pfn_valid() to ensure presence of linear map (git-fixes).\n- arm64: Do not defer reserve_crashkernel() for platforms with no DMA memory zones (git-fixes).\n- arm64: Do not include __READ_ONCE() block in assembly files (git-fixes).\n- arm64: dts: agilex: use the compatible \u0027intel,socfpga-agilex-hsotg\u0027 (git-fixes).\n- arm64: dts: armada-3720-turris-mox: Add missing ethernet0 alias (git-fixes).\n- arm64: dts: broadcom: bcm4908: use proper TWD binding (git-fixes).\n- arm64: dts: broadcom: Fix sata nodename (git-fixes).\n- arm64: dts: imx8mm-beacon: Enable RTS-CTS on UART3 (git-fixes).\n- arm64: dts: imx8mm-venice: fix spi2 pin configuration (git-fixes)\n- arm64: dts: imx8mn-beacon: Enable RTS-CTS on UART3 (git-fixes).\n- arm64: dts: imx8mn-ddr4-evk: Describe the 32.768 kHz PMIC clock (git-fixes)\n- arm64: dts: imx8mn: Fix SAI nodes (git-fixes)\n- arm64: dts: imx8mp-evk: correct eqos pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct gpio-led pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct I2C1 pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct I2C3 pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct mmc pad settings (git-fixes).\n- arm64: dts: imx8mp-evk: correct the uart2 pinctl value (git-fixes).\n- arm64: dts: imx8mp-evk: correct vbus pad settings (git-fixes).\n- arm64: dts: imx8mp-phyboard-pollux-rdk: correct eqos pad settings (git-fixes).\n- arm64: dts: imx8mp-phyboard-pollux-rdk: correct i2c2 \u0026 mmc settings (git-fixes).\n- arm64: dts: imx8mp-phyboard-pollux-rdk: correct uart pad settings (git-fixes).\n- arm64: dts: imx8mq: fix lcdif port node (git-fixes).\n- arm64: dts: imx8qm: Correct SCU clock controller\u0027s compatible (git-fixes)\n- arm64: dts: imx: Fix imx8*-var-som touchscreen property sizes (git-fixes).\n- arm64: dts: juno: Remove GICv2m dma-range (git-fixes).\n- arm64: dts: ls1028a-qds: move rtc node to the correct i2c bus (git-fixes).\n- arm64: dts: ls1043a: Update i2c dma properties (git-fixes).\n- arm64: dts: ls1046a: Update i2c node dma properties (git-fixes).\n- arm64: dts: marvell: armada-37xx: Remap IO space to bus address 0x0 (git-fixes).\n- arm64: dts: marvell: espressobin-ultra: enable front USB3 port (git-fixes).\n- arm64: dts: marvell: espressobin-ultra: fix SPI-NOR config (git-fixes).\n- arm64: dts: meson-g12: add ATF BL32 reserved-memory region (git-fixes).\n- arm64: dts: meson-g12b-odroid-n2: fix typo \u0027dio2133\u0027 (git-fixes).\n- arm64: dts: meson-g12: drop BL32 region from SEI510/SEI610 (git-fixes).\n- arm64: dts: meson-gx: add ATF BL32 reserved-memory region (git-fixes).\n- arm64: dts: meson: remove CPU opps below 1GHz for G12B boards (git-fixes).\n- arm64: dts: meson: remove CPU opps below 1GHz for SM1 boards (git-fixes).\n- arm64: dts: meson-sm1-bananapi-m5: fix wrong GPIO domain for GPIOE_2 (git-fixes).\n- arm64: dts: meson-sm1-bananapi-m5: fix wrong GPIO pin labeling for CON1 (git-fixes).\n- arm64: dts: meson-sm1-odroid: fix boot loop after reboot (git-fixes).\n- arm64: dts: meson-sm1-odroid: use correct enable-gpio pin for tf-io regulator (git-fixes).\n- arm64: dts: mt8192: Fix nor_flash status disable typo (git-fixes).\n- arm64: dts: ns2: Fix spi-cpol and spi-cpha property (git-fixes).\n- arm64: dts: qcom: ipq8074: fix the sleep clock frequency (git-fixes).\n- arm64: dts: qcom: msm8916-huawei-g7: Clarify installation instructions (git-fixes).\n- arm64: dts: qcom: msm8994: Fix BLSP[12]_DMA channels count (git-fixes).\n- arm64: dts: qcom: msm8994: Fix CPU6/7 reg values (git-fixes).\n- arm64: dts: qcom: msm8994: Fix the cont_splash_mem address (git-fixes).\n- arm64: dts: qcom: msm8996: Drop flags for mdss irqs (git-fixes).\n- arm64: dts: qcom: msm8996: remove snps,dw-pcie compatibles (git-fixes).\n- arm64: dts: qcom: pm8350c: stop depending on thermal_zones label (git-fixes).\n- arm64: dts: qcom: pmr735a: stop depending on thermal_zones label (git-fixes).\n- arm64: dts: qcom: qrb5165-rb5: Fix can-clock node name (git-fixes).\n- arm64: dts: qcom: sdm845-db845c: add wifi variant property (git-fixes).\n- arm64: dts: qcom: sdm845: Drop flags for mdss irqs (git-fixes).\n- arm64: dts: qcom: sdm845: fix microphone bias properties and values (git-fixes).\n- arm64: dts: qcom: sdm845: remove snps,dw-pcie compatibles (git-fixes).\n- arm64: dts: qcom: sdm845-xiaomi-beryllium: fix typo in panel\u0027s vddio-supply property (git-fixes).\n- arm64: dts: qcom: sm8150: Correct TCS configuration for apps rsc (git-fixes).\n- arm64: dts: qcom: sm8250: Drop flags for mdss irqs (git-fixes).\n- arm64: dts: qcom: sm8250: Fix MSI IRQ for PCIe1 and PCIe2 (git-fixes).\n- arm64: dts: qcom: sm8250: fix PCIe bindings to follow schema (git-fixes).\n- arm64: dts: qcom: sm8350: Correct TCS configuration for apps rsc (git-fixes).\n- arm64: dts: qcom: sm8350: Correct UFS symbol clocks (git-fixes).\n- arm64: dts: qcom: sm8350: Describe GCC dependency clocks (git-fixes).\n- arm64: dts: qcom: sm8350: Shorten camera-thermal-bottom name (git-fixes).\n- arm64: dts: renesas: Fix thermal bindings (git-fixes).\n- arm64: dts: renesas: ulcb-kf: fix wrong comment (git-fixes).\n- arm64: dts: rockchip: align pl330 node name with dtschema (git-fixes).\n- arm64: dts: rockchip: fix rk3399-puma eMMC HS400 signal integrity (git-fixes).\n- arm64: dts: rockchip: fix rk3399-puma-haikou USB OTG mode (git-fixes).\n- arm64: dts: rockchip: Fix SDIO regulator supply properties on rk3399-firefly (git-fixes).\n- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes).\n- arm64: dts: rockchip: reorder rk3399 hdmi clocks (git-fixes).\n- arm64: dts: rockchip: Switch RK3399-Gru DP to SPDIF output (git-fixes).\n- arm64: dts: ti: j7200-main: Fix \u0027dtbs_check\u0027 serdes_ln_ctrl node (git-fixes).\n- arm64: dts: ti: j721e-main: Fix \u0027dtbs_check\u0027 in serdes_ln_ctrl node (git-fixes).\n- arm64: dts: ti: k3-am64: Fix gic-v3 compatible regs (git-fixes).\n- arm64: dts: ti: k3-am64-main: Remove support for HS400 speed mode (git-fixes).\n- arm64: dts: ti: k3-am64-mcu: remove incorrect UART base clock rates (git-fixes).\n- arm64: dts: ti: k3-am65: Fix gic-v3 compatible regs (git-fixes).\n- arm64: dts: ti: k3-j7200: Fix gic-v3 compatible regs (git-fixes).\n- arm64: dts: ti: k3-j721e: Fix gic-v3 compatible regs (git-fixes).\n- arm64: Enable repeat tlbi workaround on KRYO4XX gold CPUs (git-fixes).\n- arm64: Ensure execute-only permissions are not allowed without EPAN (git-fixes)\n- arm64: fix clang warning about TRAMP_VALIAS (git-fixes).\n- arm64: fix types in copy_highpage() (git-fixes).\n- arm64: ftrace: consistently handle PLTs (git-fixes).\n- arm64: ftrace: fix branch range checks (git-fixes).\n- arm64: kasan: fix include error in MTE functions (git-fixes).\n- arm64: kvm: keep the field workaround_flags in structure kvm_vcpu_arch (git-fixes).\n- arm64: Mark start_backtrace() notrace and NOKPROBE_SYMBOL (git-fixes)\n- arm64: mm: Drop \u0027const\u0027 from conditional arm64_dma_phys_limit definition (git-fixes).\n- arm64: mm: fix p?d_leaf() (git-fixes).\n- arm64: module: remove (NOLOAD) from linker script (git-fixes).\n- arm64: mte: Ensure the cleared tags are visible before setting the PTE (git-fixes).\n- arm64: paravirt: Use RCU read locks to guard stolen_time (git-fixes).\n- arm64: patch_text: Fixup last cpu should be master (git-fixes).\n- arm64: prevent instrumentation of bp hardening callbacks (git-fixes).\n- arm64: signal: nofpsimd: Do not allocate fp/simd context when not available (git-fixes).\n- arm64: stackleak: fix current_top_of_stack() (git-fixes).\n- arm64: supported.conf: mark PHY_FSL_IMX8MQ_USB as supported (bsc#1199909)\n- arm64: tegra: Add missing DFLL reset on Tegra210 (git-fixes).\n- arm64: tegra: Adjust length of CCPLEX cluster MMIO region (git-fixes).\n- arm64: Update config files. (bsc#1199909) Add pfuze100 regulator as module\n- arm64: vdso: fix makefile dependency on vdso.so (git-fixes).\n- ARM: 9178/1: fix unmet dependency on BITREVERSE for HAVE_ARCH_BITREVERSE (git-fixes).\n- ARM: 9182/1: mmu: fix returns from early_param() and __setup() functions (git-fixes).\n- ARM: 9187/1: JIVE: fix return value of __setup handler (git-fixes).\n- ARM: 9191/1: arm/stacktrace, kasan: Silence KASAN warnings in unwind_frame() (git-fixes).\n- ARM: 9196/1: spectre-bhb: enable for Cortex-A15 (git-fixes).\n- ARM: 9197/1: spectre-bhb: fix loop8 sequence for Thumb2 (git-fixes).\n- ARM: at91: fix soc detection for SAM9X60 SiPs (git-fixes).\n- ARM: at91: pm: use proper compatible for sama5d2\u0027s rtc (git-fixes).\n- ARM: at91: pm: use proper compatibles for sam9x60\u0027s rtc and rtt (git-fixes).\n- ARM: boot: dts: bcm2711: Fix HVS register range (git-fixes).\n- ARM: cns3xxx: Fix refcount leak in cns3xxx_init (git-fixes).\n- ARM: configs: multi_v5_defconfig: re-enable CONFIG_V4L_PLATFORM_DRIVERS (git-fixes).\n- ARM: configs: multi_v5_defconfig: re-enable DRM_PANEL and FB_xxx (git-fixes).\n- ARM: config: u8500: Re-enable AB8500 battery charging (git-fixes).\n- ARM: davinci: da850-evm: Avoid NULL pointer dereference (git-fixes).\n- ARM: Do not use NOCROSSREFS directive with ld.lld (git-fixes).\n- ARM: dts: am3517-evm: Fix misc pinmuxing (git-fixes).\n- ARM: dts: aspeed: Add ADC for AST2600 and enable for Rainier and Everest (git-fixes).\n- ARM: dts: aspeed: Add secure boot controller node (git-fixes).\n- ARM: dts: aspeed: Add video engine to g6 (git-fixes).\n- ARM: dts: aspeed: ast2600-evb: Enable RX delay for MAC0/MAC1 (git-fixes).\n- ARM: dts: aspeed: Fix AST2600 quad spi group (git-fixes).\n- ARM: dts: aspeed-g6: fix SPI1/SPI2 quad pin group (git-fixes).\n- ARM: dts: aspeed-g6: remove FWQSPID group in pinctrl dtsi (git-fixes).\n- ARM: dts: at91: fix pinctrl phandles (git-fixes).\n- ARM: dts: at91: Map MCLK for wm8731 on at91sam9g20ek (git-fixes).\n- ARM: dts: at91: sam9x60ek: fix eeprom compatible and size (git-fixes).\n- ARM: dts: at91: sama5d2: Fix PMERRLOC resource size (git-fixes).\n- ARM: dts: at91: sama5d2_icp: fix eeprom compatibles (git-fixes).\n- ARM: dts: at91: sama5d4_xplained: fix pinctrl phandle name (git-fixes).\n- ARM: dts: bcm2711: Add the missing L1/L2 cache information (git-fixes).\n- ARM: dts: bcm2711-rpi-400: Fix GPIO line names (git-fixes).\n- ARM: dts: bcm2835-rpi-b: Fix GPIO line names (git-fixes).\n- ARM: dts: bcm2835-rpi-zero-w: Fix GPIO line name for Wifi/BT (git-fixes).\n- ARM: dts: bcm2837: Add the missing L1/L2 cache information (git-fixes).\n- ARM: dts: bcm2837-rpi-3-b-plus: Fix GPIO line name of power LED (git-fixes).\n- ARM: dts: bcm2837-rpi-cm3-io3: Fix GPIO line names for SMPS I2C (git-fixes).\n- ARM: dts: BCM5301X: update CRU block description (git-fixes).\n- ARM: dts: BCM5301X: Update pin controller node name (git-fixes).\n- ARM: dts: ci4x10: Adapt to changes in imx6qdl.dtsi regarding fec clocks (git-fixes).\n- ARM: dts: dra7: Fix suspend warning for vpe powerdomain (git-fixes).\n- ARM: dts: exynos: add atmel,24c128 fallback to Samsung EEPROM (git-fixes).\n- ARM: dts: exynos: add missing HDMI supplies on SMDK5250 (git-fixes).\n- ARM: dts: exynos: add missing HDMI supplies on SMDK5420 (git-fixes).\n- ARM: dts: exynos: fix UART3 pins configuration in Exynos5250 (git-fixes).\n- ARM: dts: Fix boot regression on Skomer (git-fixes).\n- ARM: dts: Fix mmc order for omap3-gta04 (git-fixes).\n- ARM: dts: Fix OpenBMC flash layout label addresses (git-fixes).\n- ARM: dts: Fix timer regression for beagleboard revision c (git-fixes).\n- ARM: dts: imx23-evk: Remove MX23_PAD_SSP1_DETECT from hog group (git-fixes).\n- ARM: dts: imx6dl-colibri: Fix I2C pinmuxing (git-fixes).\n- ARM: dts: imx6qdl-apalis: Fix sgtl5000 detection issue (git-fixes).\n- ARM: dts: imx6qdl: correct PU regulator ramp delay (git-fixes).\n- ARM: dts: imx6qdl-udoo: Properly describe the SD card detect (git-fixes).\n- ARM: dts: imx6ull-colibri: fix vqmmc regulator (git-fixes).\n- ARM: dts: imx7: Move hsic_phy power domain to HSIC PHY node (git-fixes).\n- ARM: dts: imx7ulp: Fix \u0027assigned-clocks-parents\u0027 typo (git-fixes).\n- ARM: dts: imx7: Use audio_mclk_post_div instead audio_mclk_root_clk (git-fixes).\n- ARM: dts: imx8mm-venice-gw{71xx,72xx,73xx}: fix OTG controller OC (git-fixes)\n- ARM: dts: imx: Add missing LVDS decoder on M53Menlo (git-fixes).\n- ARM: dts: logicpd-som-lv: Fix wrong pinmuxing on OMAP35 (git-fixes).\n- ARM: dts: meson8b: Fix the UART device-tree schema validation (git-fixes).\n- ARM: dts: meson8: Fix the UART device-tree schema validation (git-fixes).\n- ARM: dts: meson: Fix the UART compatible strings (git-fixes).\n- ARM: dts: ox820: align interrupt controller node name with dtschema (git-fixes).\n- ARM: dts: qcom: fix gic_irq_domain_translate warnings for msm8960 (git-fixes).\n- ARM: dts: qcom: ipq4019: fix sleep clock (git-fixes).\n- ARM: dts: qcom: msm8974: Drop flags for mdss irqs (git-fixes).\n- ARM: dts: qcom: sdx55: fix IPA interconnect definitions (git-fixes).\n- ARM: dts: rockchip: fix a typo on rk3288 crypto-controller (git-fixes).\n- ARM: dts: rockchip: reorder rk322x hmdi clocks (git-fixes).\n- ARM: dts: s5pv210: align DMA channels with dtschema (git-fixes).\n- ARM: dts: s5pv210: Correct interrupt name for bluetooth in Aries (git-fixes).\n- ARM: dts: s5pv210: Remove spi-cs-high on panel in Aries (git-fixes).\n- ARM: dts: socfpga: align interrupt controller node name with dtschema (git-fixes).\n- ARM: dts: socfpga: change qspi to \u0027intel,socfpga-qspi\u0027 (git-fixes).\n- ARM: dts: spear1340: Update serial node properties (git-fixes).\n- ARM: dts: spear13xx: Update SPI dma properties (git-fixes).\n- ARM: dts: stm32: fix AV96 board SAI2 pin muxing on stm32mp15 (git-fixes).\n- ARM: dts: stm32: Fix PHY post-reset delay on Avenger96 (git-fixes).\n- ARM: dts: sun8i: v3s: Move the csi1 block to follow address order (git-fixes).\n- ARM: dts: suniv: F1C100: fix watchdog compatible (git-fixes).\n- ARM: dts: switch timer config to common devkit8000 devicetree (git-fixes).\n- ARM: dts: Use 32KiHz oscillator on devkit8000 (git-fixes).\n- ARM: exynos: Fix refcount leak in exynos_map_pmu (git-fixes).\n- ARM: fix build warning in proc-v7-bugs.c (git-fixes).\n- ARM: fix co-processor register typo (git-fixes).\n- ARM: Fix kgdb breakpoint for Thumb2 (git-fixes).\n- ARM: Fix refcount leak in axxia_boot_secondary (git-fixes).\n- ARM: fix Thumb2 regression with Spectre BHB (git-fixes).\n- ARM: ftrace: avoid redundant loads or clobbering IP (git-fixes).\n- ARM: ftrace: ensure that ADR takes the Thumb bit into account (git-fixes).\n- ARM: hisi: Add missing of_node_put after of_find_compatible_node (git-fixes).\n- ARM: iop32x: offset IRQ numbers by 1 (git-fixes).\n- ARM: kprobes: Make space for instruction pointer on stack (bsc#1193277).\n- ARM: mediatek: select arch timer for mt7629 (git-fixes).\n- ARM: meson: Fix refcount leak in meson_smp_prepare_cpus (git-fixes).\n- ARM: mmp: Fix failure to remove sram device (git-fixes).\n- ARM: mstar: Select HAVE_ARM_ARCH_TIMER (git-fixes).\n- ARM: mxs_defconfig: Enable the framebuffer (git-fixes).\n- ARM: omap1: ams-delta: remove camera leftovers (git-fixes).\n- ARM: OMAP1: clock: Fix UART rate reporting algorithm (git-fixes).\n- ARM: OMAP2+: adjust the location of put_device() call in omapdss_init_of (git-fixes).\n- ARM: OMAP2+: Fix refcount leak in omap_gic_of_init (git-fixes).\n- ARM: OMAP2+: hwmod: Add of_node_put() before break (git-fixes).\n- ARM: pxa: maybe fix gpio lookup tables (git-fixes).\n- ARM: socfpga: fix missing RESET_CONTROLLER (git-fixes).\n- ARM: Spectre-BHB: provide empty stub for non-config (git-fixes).\n- ARM: tegra: tamonten: Fix I2C3 pad setting (git-fixes).\n- ARM: vexpress/spc: Avoid negative array index when !SMP (git-fixes).\n- ASoC: amd: Fix reference to PCM buffer address (git-fixes).\n- ASoC: amd: vg: fix for pm resume callback sequence (git-fixes).\n- ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe (git-fixes).\n- ASoC: atmel-classd: Remove endianness flag on class d component (git-fixes).\n- ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe (git-fixes).\n- ASoC: atmel: Fix error handling in snd_proto_probe (git-fixes).\n- ASoC: atmel-pdmic: Remove endianness flag on pdmic component (git-fixes).\n- ASoC: atmel: Remove system clock tree configuration for at91sam9g20ek (git-fixes).\n- ASoC: atmel_ssc_dai: Handle errors for clk_enable (git-fixes).\n- ASoC: codecs: Check for error pointer after calling devm_regmap_init_mmio (git-fixes).\n- ASoC: codecs: lpass-rx-macro: fix sidetone register offsets (git-fixes).\n- ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type (git-fixes).\n- ASoC: codecs: rx-macro: fix accessing compander for aux (git-fixes).\n- ASoC: codecs: va-macro: fix accessing array out of bounds for enum type (git-fixes).\n- ASoC: codecs: wc938x: fix accessing array out of bounds for enum type (git-fixes).\n- ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data (git-fixes).\n- ASoC: codecs: wcd934x: do not switch off SIDO Buck when codec is in use (git-fixes).\n- ASoC: codecs: wcd934x: fix kcontrol max values (git-fixes).\n- ASoC: codecs: wcd934x: fix return value of wcd934x_rx_hph_mode_put (git-fixes).\n- ASoC: codecs: wcd938x: fix return value of mixer put function (git-fixes).\n- ASoC: cpcap: Check for NULL pointer after calling of_get_child_by_name (git-fixes).\n- ASoC: cs35l36: Update digital volume TLV (git-fixes).\n- ASoC: cs4265: Fix the duplicated control name (git-fixes).\n- ASoC: cs42l51: Correct minimum value for SX volume control (git-fixes).\n- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).\n- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).\n- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).\n- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).\n- ASoC: da7219: Fix change notifications for tone generator frequency (git-fixes).\n- ASoC: dapm: Do not fold register value changes into notifications (git-fixes).\n- ASoC: dmaengine: do not use a NULL prepare_slave_config() callback (git-fixes).\n- ASoC: dmaengine: Restore NULL prepare_slave_config() callback (git-fixes).\n- ASoC: dwc-i2s: Handle errors for clk_enable (git-fixes).\n- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).\n- ASoC: fsi: Add check for clk_enable (git-fixes).\n- ASoC: fsl: Add missing error handling in pcm030_fabric_probe (git-fixes).\n- ASoC: fsl: Fix refcount leak in imx_sgtl5000_probe (git-fixes).\n- ASoC: fsl_sai: Fix FSL_SAI_xDR/xFR definition (git-fixes).\n- ASoC: fsl_spdif: Disable TX clock when stop (git-fixes).\n- ASoC: fsl: Use dev_err_probe() helper (git-fixes).\n- ASoC: hdmi-codec: Fix OOB memory accesses (git-fixes).\n- ASoC: imx-es8328: Fix error return code in imx_es8328_probe() (git-fixes).\n- ASoC: imx-hdmi: Fix refcount leak in imx_hdmi_probe (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for the HP Pro Tablet 408 (git-fixes).\n- ASoC: intel: skylake: Set max DMA segment size (git-fixes).\n- ASoC: Intel: soc-acpi: correct device endpoints for max98373 (git-fixes).\n- ASoC: Intel: sof_sdw: fix quirks for 2022 HP Spectre x360 13\u0027 (git-fixes).\n- ASoC: madera: Add dependencies on MFD (git-fixes).\n- ASoC: max9759: fix underflow in speaker_gain_control_put() (git-fixes).\n- ASoC: max98090: Generate notifications on changes for custom control (git-fixes).\n- ASoC: max98090: Move check for invalid values before casting in max98090_put_enab_tlv() (git-fixes).\n- ASoC: max98090: Reject invalid values in custom control put() (git-fixes).\n- ASoC: max98357a: remove dependency on GPIOLIB (git-fixes).\n- ASoC: mediatek: Fix error handling in mt8173_max98090_dev_probe (git-fixes).\n- ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe (git-fixes).\n- ASoC: mediatek: mt6358: add missing EXPORT_SYMBOLs (git-fixes).\n- ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe (git-fixes).\n- ASoC: mediatek: use of_device_get_match_data() (git-fixes).\n- ASoC: meson: Fix event generation for AUI ACODEC mux (git-fixes).\n- ASoC: meson: Fix event generation for AUI CODEC mux (git-fixes).\n- ASoC: meson: Fix event generation for G12A tohdmi mux (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix error handling in pm8916_wcd_analog_spmi_probe (git-fixes).\n- ASoC: msm8916-wcd-digital: Check failure for devm_snd_soc_register_component (git-fixes).\n- ASoC: msm8916-wcd-digital: Fix missing clk_disable_unprepare() in msm8916_wcd_digital_probe (git-fixes).\n- ASoC: mxs: Fix error handling in mxs_sgtl5000_probe (git-fixes).\n- ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe (git-fixes).\n- ASoC: mxs-saif: Handle errors for clk_enable (git-fixes).\n- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_range() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_volsw_sx() (git-fixes).\n- ASoC: ops: Fix stereo change notifications in snd_soc_put_xr_sx() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() (git-fixes).\n- ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() (git-fixes).\n- ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min (git-fixes).\n- ASoC: ops: Validate input values in snd_soc_put_volsw_range() (git-fixes).\n- ASoC: qcom: Actually clear DMA interrupt register for HDMI (git-fixes).\n- ASoC: rk3328: fix disabling mclk on pclk probe failure (git-fixes).\n- ASoC: rk817: Fix missing clk_disable_unprepare() in rk817_platform_probe (git-fixes).\n- ASoC: rk817: Use devm_clk_get() in rk817_platform_probe (git-fixes).\n- ASoC: rockchip: i2s: Fix missing clk_disable_unprepare() in rockchip_i2s_probe (git-fixes).\n- ASoC: rsnd: care default case on rsnd_ssiu_busif_err_status_clear() (git-fixes).\n- ASoC: rsnd: care return value from rsnd_node_fixed_index() (git-fixes).\n- ASoC: rt1015p: remove dependency on GPIOLIB (git-fixes).\n- ASoC: rt5514: Fix event generation for \u0027DSP Voice Wake Up\u0027 control (git-fixes).\n- ASoC: rt5645: Fix errorenous cleanup order (git-fixes).\n- ASoC: rt5663: check the return value of devm_kzalloc() in rt5663_parse_dp() (git-fixes).\n- ASoC: rt5668: do not block workqueue if card is unbound (git-fixes).\n- ASoC: rt5682: do not block workqueue if card is unbound (git-fixes).\n- ASoC: samsung: Fix refcount leak in aries_audio_probe (git-fixes).\n- ASoC: samsung: Use dev_err_probe() helper (git-fixes).\n- ASoC: simple-card: fix probe failure on platform component (git-fixes).\n- ASoC: simple-card-utils: Set sysclk on all components (git-fixes).\n- ASoC: soc-compress: Change the check for codec_dai (git-fixes).\n- ASoC: soc-compress: prevent the potentially use of null pointer (git-fixes).\n- ASoC: soc-core: skip zero num_dai component in searching dai name (git-fixes).\n- ASoC: soc-dapm: fix two incorrect uses of list iterator (git-fixes).\n- ASoC: soc-ops: fix error handling (git-fixes).\n- ASoC: SOF: Add missing of_node_put() in imx8m_probe (git-fixes).\n- ASoC: SOF: Fix NULL pointer exception in sof_pci_probe callback (git-fixes).\n- ASoC: SOF: hda: Set max DMA segment size (git-fixes).\n- ASoC: SOF: Intel: enable DMI L1 for playback streams (git-fixes).\n- ASoC: SOF: Intel: Fix build error without SND_SOC_SOF_PCI_DEV (git-fixes).\n- ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM (git-fixes).\n- ASoC: SOF: Intel: match sdw version on link_slaves_found (git-fixes).\n- ASoC: SOF: topology: remove redundant code (git-fixes).\n- ASoC: sti: Fix deadlock via snd_pcm_stop_xrun() call (git-fixes).\n- ASoC: tas2770: Insert post reset delay (git-fixes).\n- ASoC: ti: davinci-i2s: Add check for clk_enable() (git-fixes).\n- ASoC: ti: j721e-evm: Fix refcount leak in j721e_soc_probe_* (git-fixes).\n- ASoC: topology: Allow TLV control to be either read or write (git-fixes).\n- ASoC: topology: Correct error handling in soc_tplg_dapm_widget_create() (git-fixes).\n- ASoC: topology: Optimize soc_tplg_dapm_graph_elems_load behavior (git-fixes).\n- ASoC: tscs454: Add endianness flag in snd_soc_component_driver (git-fixes).\n- ASoC: wm2000: fix missing clk_disable_unprepare() on error in wm2000_anc_transition() (git-fixes).\n- ASoC: wm8350: Handle error for wm8350_register_irq (git-fixes).\n- ASoC: wm8958: Fix change notifications for DSP controls (git-fixes).\n- ASoC: wm8962: Fix suspend while playing music (git-fixes).\n- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).\n- ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting (git-fixes).\n- ASoC: xilinx: xlnx_formatter_pcm: Make buffer bytes multiple of period bytes (git-fixes).\n- assoc_array: Fix BUG_ON during garbage collect (git-fixes).\n- asus-wmi: Add dgpu disable method (bsc#1198058).\n- asus-wmi: Add egpu enable method (bsc#1198058).\n- asus-wmi: Add panel overdrive functionality (bsc#1198058).\n- asus-wmi: Add support for platform_profile (bsc#1198058).\n- ata: libata: add qc-\u003eflags in ata_qc_complete_template tracepoint (git-fixes).\n- ata: libata-core: Disable READ LOG DMA EXT for Samsung 840 EVOs (git-fixes).\n- ata: libata-core: Disable TRIM on M88V29 (git-fixes).\n- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).\n- ata: libata-transport: fix {dma|pio|xfer}_mode sysfs files (git-fixes).\n- ata: pata_hpt37x: disable primary channel on HPT371 (git-fixes).\n- ata: pata_hpt37x: fix PCI clock detection (git-fixes).\n- ata: pata_marvell: Check the \u0027bmdma_addr\u0027 beforing reading (git-fixes).\n- ata: pata_octeon_cf: Fix refcount leak in octeon_cf_probe (git-fixes).\n- ata: sata_dwc_460ex: Fix crash due to OOB write (git-fixes).\n- ath10k: Fix error handling in ath10k_setup_msa_resources (git-fixes).\n- ath10k: fix memory overwrite of the WoWLAN wakeup packet pattern (git-fixes).\n- ath10k: skip ath10k_halt during suspend for driver state RESTARTING (git-fixes).\n- ath11k: acquire ab-\u003ebase_lock in unassign when finding the peer by addr (git-fixes).\n- ath11k: disable spectral scan during spectral deinit (git-fixes).\n- ath11k: Do not check arvif-\u003eis_started before sending management frames (git-fixes).\n- ath11k: fix kernel panic during unload/load ath11k modules (git-fixes).\n- ath11k: mhi: use mhi_sync_power_up() (git-fixes).\n- ath11k: pci: fix crash on suspend if board file is not found (git-fixes).\n- ath11k: set correct NL80211_FEATURE_DYNAMIC_SMPS for WCN6855 (git-fixes).\n- ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (git-fixes).\n- ath9k: fix ar9003_get_eepmisc (git-fixes).\n- ath9k: fix QCA9561 PA bias level (git-fixes).\n- ath9k: Fix usage of driver-private space in tx_info (git-fixes).\n- ath9k_htc: fix potential out of bounds access with invalid rxstatus-\u003ers_keyix (git-fixes).\n- ath9k_htc: fix uninit value bugs (git-fixes).\n- ath9k: Properly clear TX status area before reporting to mac80211 (git-fixes).\n- atl1c: fix tx timeout after link flap on Mikrotik 10/25G NIC (git-fixes).\n- atm: eni: Add check for dma_map_single (git-fixes).\n- atm: firestream: check the return value of ioremap() in fs_init() (git-fixes).\n- atomics: Fix atomic64_{read_acquire,set_release} fallbacks (git-fixes).\n- audit: ensure userspace is penalized the same as the kernel when under pressure (git-fixes).\n- audit: improve audit queue handling when \u0027audit=1\u0027 on cmdline (git-fixes).\n- audit: improve robustness of the audit queue handling (git-fixes).\n- auxdisplay: lcd2s: Fix lcd2s_redefine_char() feature (git-fixes).\n- auxdisplay: lcd2s: Fix memory leak in -\u003eremove() (git-fixes).\n- auxdisplay: lcd2s: Use proper API to free the instance of charlcd object (git-fixes).\n- ax25: Fix NULL pointer dereference in ax25_kill_by_device (git-fixes).\n- ax25: improve the incomplete fix to avoid UAF and NPD bugs (git-fixes).\n- b43: Fix assigning negative value to unsigned variable (git-fixes).\n- b43legacy: Fix assigning negative value to unsigned variable (git-fixes).\n- bareudp: use ipv6_mod_enabled to check if IPv6 enabled (git-fixes).\n- batman-adv: Do not expect inter-netns unique iflink indices (git-fixes).\n- batman-adv: Do not skb_split skbuffs with frag_list (git-fixes).\n- batman-adv: Request iflink once in batadv_get_real_netdevice (git-fixes).\n- batman-adv: Request iflink once in batadv-on-batadv check (git-fixes).\n- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).\n- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).\n- bcache: fixup multiple threads crash (git-fixes).\n- bcache: fix use-after-free problem in bcache_device_free() (git-fixes).\n- bcache: improve multithreaded bch_btree_check() (git-fixes).\n- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).\n- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).\n- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).\n- bfq: Allow current waker to defend against a tentative one (bsc#1195915).\n- bfq: Avoid false marking of bic as stably merged (bsc#1197926).\n- bfq: Avoid merging queues with different parents (bsc#1197926).\n- bfq: Do not let waker requests skip proper accounting (bsc#1184318).\n- bfq: Drop pointless unlock-lock pair (bsc#1197926).\n- bfq: Fix warning in bfqq_request_over_limit() (bsc#1200812).\n- bfq: Get rid of __bio_blkcg() usage (bsc#1197926).\n- bfq: Limit number of requests consumed by each cgroup (bsc#1184318).\n- bfq: Limit waker detection in time (bsc#1184318).\n- bfq: Make sure bfqg for which we are queueing requests is online (bsc#1197926).\n- bfq: Relax waker detection for shared queues (bsc#1184318).\n- bfq: Remove pointless bfq_init_rq() calls (bsc#1197926).\n- bfq: Split shared queues on move between cgroups (bsc#1197926).\n- bfq: Store full bitmap depth in bfq_data (bsc#1184318).\n- bfq: Track number of allocated requests in bfq_entity (bsc#1184318).\n- bfq: Track whether bfq_group is still online (bsc#1197926).\n- bfq: Update cgroup information before merging bio (bsc#1197926).\n- binfmt_flat: do not stop relocating GOT entries prematurely on riscv (git-fixes).\n- bitfield: add explicit inclusions to the example (git-fixes).\n- blkcg: Remove extra blkcg_bio_issue_init (bsc#1194585).\n- blk-cgroup: move blkcg_{get,set}_fc_appid out of line (bsc#1200045).\n- blk-cgroup: set blkg iostat after percpu stat aggregation (bsc#1198018).\n- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).\n- blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release() (bsc#1198034).\n- blk-mq: do not touch -\u003etagset in blk_mq_get_sq_hctx (bsc#1200824).\n- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).\n- blk-mq: fix tag_get wait task can\u0027t be awakened (bsc#1200263).\n- blk-mq: Fix wrong wakeup batch configuration which will cause hang (bsc#1200263).\n- blktrace: fix use after free for struct blk_trace (bsc#1198017).\n- block: assign bi_bdev for cloned bios in blk_rq_prep_clone (bsc#1198016).\n- block: avoid to quiesce queue in elevator_init_mq (bsc#1198013).\n- block, bfq: fix UAF problem in bfqg_stats_init() (bsc#1194583).\n- block: bio-integrity: Advance seed correctly for larger interval sizes (git-fixes).\n- block: Check ADMIN before NICE for IOPRIO_CLASS_RT (bsc#1198012).\n- block: do not delete queue kobject before its children (bsc#1198019).\n- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).\n- block: fix async_depth sysfs interface for mq-deadline (bsc#1198015).\n- block: fix bio_clone_blkg_association() to associate with proper blkcg_gq (bsc#1200259).\n- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (git-fixes).\n- block: fix ioprio_get(IOPRIO_WHO_PGRP) vs setuid(2) (bsc#1194586).\n- block: Fix the maximum minor value is blk_alloc_ext_minor() (bsc#1198021).\n- block: Fix up kabi after blkcg merge fix (bsc#1198020).\n- block: Hold invalidate_lock in BLKRESETZONE ioctl (bsc#1198010).\n- block: limit request dispatch loop duration (bsc#1198022).\n- block/mq-deadline: Improve request accounting further (bsc#1198009).\n- block: Provide blk_mq_sched_get_icq() (bsc#1184318).\n- block: update io_ticks when io hang (bsc#1197817).\n- block/wbt: fix negative inflight counter when remove scsi device (bsc#1197819).\n- Bluetooth: btintel: Fix WBS setting for Intel legacy ROM products (git-fixes).\n- Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt (git-fixes).\n- Bluetooth: btusb: Add another Realtek 8761BU (git-fixes).\n- Bluetooth: btusb: Add missing Chicony device for Realtek RTL8723BE (bsc#1196779).\n- Bluetooth: btusb: Add one more Bluetooth part for the Realtek RTL8852AE (git-fixes).\n- Bluetooth: btusb: Whitespace fixes for btusb_setup_csr() (git-fixes).\n- Bluetooth: call hci_le_conn_failed with hdev lock in hci_le_conn_failed (git-fixes).\n- Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout (git-fixes).\n- Bluetooth: Fix not checking for valid hdev on bt_dev_{info,warn,err,dbg} (git-fixes).\n- Bluetooth: Fix the creation of hdev-\u003ename (git-fixes).\n- Bluetooth: Fix use after free in hci_send_acl (git-fixes).\n- Bluetooth: hci_qca: Use del_timer_sync() before freeing (git-fixes).\n- Bluetooth: hci_serdev: call init_rwsem() before p-\u003eopen() (git-fixes).\n- Bluetooth: use hdev lock for accept_list and reject_list in conn req (git-fixes).\n- Bluetooth: use hdev lock in activate_scan for hci_is_adv_monitoring (git-fixes).\n- Bluetooth: use memset avoid memory leaks (git-fixes).\n- bnx2x: fix napi API usage sequence (bsc#1198217).\n- bnxt_en: Do not destroy health reporters during reset (bsc#1199736).\n- bnxt_en: Eliminate unintended link toggle during FW reset (bsc#1199736).\n- bnxt_en: Fix active FEC reporting to ethtool (git-fixes).\n- bnxt_en: Fix devlink fw_activate (jsc#SLE-18978).\n- bnxt_en: Fix incorrect multicast rx mask setting when not requested (git-fixes).\n- bnxt_en: Fix occasional ethtool -t loopback test failures (git-fixes).\n- bnxt_en: Fix offline ethtool selftest with RDMA enabled (git-fixes).\n- bnxt_en: Fix possible bnxt_open() failure caused by wrong RFS flag (git-fixes).\n- bnxt_en: Fix unnecessary dropping of RX packets (git-fixes).\n- bnxt_en: Increase firmware message response DMA wait time (git-fixes).\n- bnxt_en: Prevent XDP redirect from running when stopping TX queue (git-fixes).\n- bnxt_en: reserve space inside receive page for skb_shared_info (git-fixes).\n- bnxt_en: Restore the resets_reliable flag in bnxt_open() (jsc#SLE-18978).\n- bnxt_en: Synchronize tx when xdp redirects happen on same ring (git-fixes).\n- bonding: fix data-races around agg_select_timer (git-fixes).\n- bonding: force carrier update when releasing slave (git-fixes).\n- bonding: pair enable_port with slave_arr_updates (git-fixes).\n- bpf: Add check_func_arg_reg_off function (git-fixes).\n- bpf: add config to allow loading modules with BTF mismatches (bsc#1194501).\n- bpf: Avoid races in __bpf_prog_run() for 32bit arches (git-fixes).\n- bpf: Disallow negative offset in check_ptr_off_reg (git-fixes).\n- bpf: Fix comment for helper bpf_current_task_under_cgroup() (git-fixes).\n- bpf: Fix kernel address leakage in atomic cmpxchg\u0027s r0 aux reg (git-fixes).\n- bpf: Fix PTR_TO_BTF_ID var_off check (git-fixes).\n- bpf: Fix UAF due to race between btf_try_get_module and load_module (git-fixes).\n- bpf: Mark PTR_TO_FUNC register initially with zero offset (git-fixes).\n- bpf: Resolve to prog-\u003eaux-\u003edst_prog-\u003etype only for BPF_PROG_TYPE_EXT (git-fixes).\n- bpf: selftests: adapt bpf_iter_task_vma to get_inode_dev() (bsc#1198585).\n- bpf, selftests: Fix racing issue in btf_skc_cls_ingress test (git-fixes).\n- bpf, selftests: Update test case for atomic cmpxchg on r0 with pointer (git-fixes).\n- bpftool: Fix memory leak in prog_dump() (git-fixes).\n- bpftool: Remove inclusion of utilities.mak from Makefiles (git-fixes).\n- bpftool: Remove unused includes to bpf/bpf_gen_internal.h (git-fixes).\n- bpftool: Remove useless #include to perf-sys.h from map_perf_ring.c (git-fixes).\n- brcmfmac: firmware: Allocate space for default boardrev in nvram (git-fixes).\n- brcmfmac: firmware: Fix crash in brcm_alt_fw_path (git-fixes).\n- brcmfmac: pcie: Declare missing firmware files in pcie.c (git-fixes).\n- brcmfmac: pcie: Fix crashes due to early IRQs (git-fixes).\n- brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path (git-fixes).\n- brcmfmac: pcie: Replace brcmf_pcie_copy_mem_todev with memcpy_toio (git-fixes).\n- brcmfmac: sdio: Fix undefined behavior due to shift overflowing the constant (git-fixes).\n- btrfs: add a BTRFS_FS_ERROR helper (bsc#1197915).\n- btrfs: add btrfs_set_item_*_nr() helpers (bsc#1197915).\n- btrfs: add helper to truncate inode items when logging inode (bsc#1197915).\n- btrfs: add missing run of delayed items after unlink during log replay (bsc#1197915).\n- btrfs: add ro compat flags to inodes (bsc#1197915).\n- btrfs: always update the logged transaction when logging new names (bsc#1197915).\n- btrfs: assert that extent buffers are write locked instead of only locked (bsc#1197915).\n- btrfs: avoid attempt to drop extents when logging inode for the first time (bsc#1197915).\n- btrfs: avoid expensive search when dropping inode items from log (bsc#1197915).\n- btrfs: avoid expensive search when truncating inode items from the log (bsc#1197915).\n- btrfs: Avoid live-lock in search_ioctl() on hardware with sub-page (git-fixes)\n- btrfs: avoid search for logged i_size when logging inode if possible (bsc#1197915).\n- btrfs: avoid unnecessarily logging directories that had no changes (bsc#1197915).\n- btrfs: avoid unnecessary lock and leaf splits when updating inode in the log (bsc#1197915).\n- btrfs: avoid unnecessary log mutex contention when syncing log (bsc#1197915).\n- btrfs: change error handling for btrfs_delete_*_in_log (bsc#1197915).\n- btrfs: change handle_fs_error in recover_log_trees to aborts (bsc#1197915).\n- btrfs: check if a log tree exists at inode_logged() (bsc#1197915).\n- btrfs: constify and cleanup variables in comparators (bsc#1197915).\n- btrfs: do not commit delayed inode when logging a file in full sync mode (bsc#1197915).\n- btrfs: do not log new dentries when logging that a new name exists (bsc#1197915).\n- btrfs: do not pin logs too early during renames (bsc#1197915).\n- btrfs: drop the _nr from the item helpers (bsc#1197915).\n- btrfs: eliminate some false positives when checking if inode was logged (bsc#1197915).\n- btrfs: factor out the copying loop of dir items from log_dir_items() (bsc#1197915).\n- btrfs: fix lost prealloc extents beyond eof after full fsync (bsc#1197915).\n- btrfs: fix lzo_decompress_bio() kmap leakage (bsc#1193852).\n- btrfs: fix memory leak in __add_inode_ref() (bsc#1197915).\n- btrfs: fix missing last dir item offset update when logging directory (bsc#1197915).\n- btrfs: fix re-dirty process of tree-log nodes (bsc#1197915).\n- btrfs: improve the batch insertion of delayed items (bsc#1197915).\n- btrfs: insert items in batches when logging a directory when possible (bsc#1197915).\n- btrfs: introduce btrfs_lookup_match_dir (bsc#1197915).\n- btrfs: introduce item_nr token variant helpers (bsc#1197915).\n- btrfs: keep track of the last logged keys when logging a directory (bsc#1197915).\n- btrfs: loop only once over data sizes array when inserting an item batch (bsc#1197915).\n- btrfs: make btrfs_file_extent_inline_item_len take a slot (bsc#1197915).\n- btrfs: only copy dir index keys when logging a directory (bsc#1197915).\n- btrfs: remove no longer needed checks for NULL log context (bsc#1197915).\n- btrfs: remove no longer needed full sync flag check at inode_logged() (bsc#1197915).\n- btrfs: remove no longer needed logic for replaying directory deletes (bsc#1197915).\n- btrfs: remove redundant log root assignment from log_dir_items() (bsc#1197915).\n- btrfs: remove root argument from add_link() (bsc#1197915).\n- btrfs: remove root argument from btrfs_log_inode() and its callees (bsc#1197915).\n- btrfs: remove root argument from btrfs_unlink_inode() (bsc#1197915).\n- btrfs: remove root argument from check_item_in_log() (bsc#1197915).\n- btrfs: remove root argument from drop_one_dir_item() (bsc#1197915).\n- btrfs: remove the btrfs_item_end() helper (bsc#1197915).\n- btrfs: remove unnecessary list head initialization when syncing log (bsc#1197915).\n- btrfs: remove unneeded return variable in btrfs_lookup_file_extent (bsc#1197915).\n- btrfs: rename btrfs_item_end_nr to btrfs_item_data_end (bsc#1197915).\n- btrfs: stop doing GFP_KERNEL memory allocations in the ref verify tool (bsc#1197915).\n- btrfs: unexport setup_items_for_insert() (bsc#1197915).\n- btrfs: unify lookup return value when dir entry is missing (bsc#1197915).\n- btrfs: update comment at log_conflicting_inodes() (bsc#1197915).\n- btrfs: use btrfs_item_size_nr/btrfs_item_offset_nr everywhere (bsc#1197915).\n- btrfs: use btrfs_next_leaf instead of btrfs_next_item when slots \u003e nritems (bsc#1197915).\n- btrfs: use single bulk copy operations when logging directories (bsc#1197915).\n- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).\n- bus: sunxi-rsb: Fix the return value of sunxi_rsb_device_create() (git-fixes).\n- bus: ti-sysc: Fix warnings for unbind for serial (git-fixes).\n- bus: ti-sysc: Make omap3 gpt12 quirk handling SoC specific (git-fixes).\n- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).\n- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).\n- can: etas_es58x: change opened_channel_cnt\u0027s type from atomic_t to u8 (git-fixes).\n- can: etas_es58x: es58x_fd_rx_event_msg(): initialize rx_event_msg before calling es58x_check_msg_len() (git-fixes).\n- can: grcan: grcan_close(): fix deadlock (git-fixes).\n- can: grcan: grcan_probe(): fix broken system id check for errata workaround needs (git-fixes).\n- can: grcan: only use the NAPI poll budget for RX (git-fixes).\n- can: grcan: use ofdev-\u003edev when allocating DMA memory (git-fixes).\n- can: gs_usb: change active_channels\u0027s type from atomic_t to u8 (git-fixes).\n- can: isotp: fix error path in isotp_sendmsg() to unlock wait queue (git-fixes).\n- can: isotp: fix potential CAN frame reception race in isotp_rcv() (git-fixes).\n- can: isotp: restore accidentally removed MSG_PEEK feature (git-fixes).\n- can: isotp: return -EADDRNOTAVAIL when reading from unbound socket (git-fixes).\n- can: isotp: set default value for N_As to 50 micro seconds (git-fixes).\n- can: isotp: stop timeout monitoring when no first frame was sent (git-fixes).\n- can: isotp: support MSG_TRUNC flag when reading from socket (git-fixes).\n- can: m_can: m_can_tx_handler(): fix use after free of skb (git-fixes).\n- can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path (git-fixes).\n- can: mcba_usb: properly check endpoint type (git-fixes).\n- can: mcp251xfd: mcp251xfd_register_get_dev_id(): fix return of error value (git-fixes).\n- can: mcp251xfd: silence clang\u0027s -Wunaligned-access warning (git-fixes).\n- can: rcar_canfd: add __maybe_unused annotation to silence warning (git-fixes).\n- can: rcar_canfd: rcar_canfd_channel_probe(): register the CAN device when fully ready (git-fixes).\n- can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path (git-fixes).\n- can: xilinx_can: mark bit timing constants as const (git-fixes).\n- carl9170: fix missing bit-wise or operator for tx_params (git-fixes).\n- carl9170: tx: fix an incorrect use of list iterator (git-fixes).\n- CDC-NCM: avoid overflow in sanity checking (git-fixes).\n- ceph: fix setting of xattrs on async created inodes (bsc#1199611).\n- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).\n- cfg80211: declare MODULE_FIRMWARE for regulatory.db (git-fixes).\n- cfg80211: do not add non transmitted BSS to 6GHz scanned channels (git-fixes).\n- cfg80211: fix race in netlink owner interface destruction (git-fixes).\n- cfg80211: hold bss_lock while updating nontrans_list (git-fixes).\n- cgroup/cpuset: Fix a race between cpuset_attach() and cpu hotplug (bsc#1196869).\n- cgroup/cpuset: Fix \u0027suspicious RCU usage\u0027 lockdep warning (bsc#1196868).\n- cgroup/cpuset: Remove cpus_allowed/mems_allowed setup in cpuset_init_smp() (bsc#1199839).\n- cgroup-v1: Correct privileges check in release_agent writes (bsc#1196723).\n- char: tpm: cr50_i2c: Suppress duplicated error message in .remove() (git-fixes).\n- char: xillybus: fix a refcount leak in cleanup_dev() (git-fixes).\n- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1193629).\n- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1193629).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1193629).\n- cifs: avoid parallel session setups on same channel (bsc#1193629).\n- cifs: avoid race during socket reconnect between send and recv (bsc#1193629).\n- cifs: call cifs_reconnect when a connection is marked (bsc#1193629).\n- cifs: call helper functions for marking channels for reconnect (bsc#1193629).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1193629).\n- cifs: check for smb1 in open_cached_dir() (bsc#1193629).\n- cifs: check reconnects for channels of active tcons too (bsc#1193629).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1193629).\n- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1193629).\n- cifs: clean up an inconsistent indenting (bsc#1193629).\n- cifs: convert the path to utf16 in smb2_query_info_compound (bsc#1193629).\n- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1193629).\n- cifs: do not build smb1ops if legacy support is disabled (bsc#1193629).\n- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1193629).\n- cifs: do not skip link targets when an I/O fails (bsc#1194625).\n- cifs: do not use tcpStatus after negotiate completes (bsc#1193629).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1193629).\n- cifs: fix bad fids sent over wire (bsc#1197157).\n- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1193629).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1193629).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1193629).\n- cifs: fix handlecache and multiuser (bsc#1193629).\n- cifs: fix hang on cifs_get_next_mid() (bsc#1193629).\n- cifs: fix incorrect use of list iterator after the loop (bsc#1193629).\n- cifs: fix minor compile warning (bsc#1193629).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1193629).\n- cifs: fix potential deadlock in direct reclaim (bsc#1193629).\n- cifs: fix potential double free during failed mount (bsc#1193629).\n- cifs: fix potential race with cifsd thread (bsc#1193629).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1193629).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1193629).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1193629).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1193629).\n- cifs: fix the connection state transitions with multichannel (bsc#1193629).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1193629).\n- cifs: fix workstation_name for multiuser mounts (bsc#1193629).\n- cifs: force new session setup and tcon for dfs (bsc#1193629).\n- cifs: free ntlmsspblob allocated in negotiate (bsc#1193629).\n- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1193629).\n- cifs: make status checks in version independent callers (bsc#1193629).\n- cifs: mark sessions for reconnection in helper function (bsc#1193629).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1193629).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1193629).\n- cifs: move superblock magic defitions to magic.h (bsc#1193629).\n- cifs: potential buffer overflow in handling symlinks (bsc#1193629).\n- cifs: print TIDs as hex (bsc#1193629).\n- cifs: protect all accesses to chan_* with chan_lock (bsc#1193629).\n- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1193629).\n- cifs: reconnect only the connection and not smb session where possible (bsc#1193629).\n- cifs: release cached dentries only if mount is complete (bsc#1193629).\n- cifs: remove check of list iterator against head past the loop body (bsc#1193629).\n- cifs: remove redundant assignment to pointer p (bsc#1193629).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1193629).\n- cifs: remove repeated state change in dfs tree connect (bsc#1193629).\n- cifs: remove unused variable ses_selected (bsc#1193629).\n- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1193629).\n- cifs: return the more nuanced writeback error on close() (bsc#1193629).\n- cifs: serialize all mount attempts (bsc#1193629).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1193629).\n- cifs: skip trailing separators of prefix paths (bsc#1193629).\n- cifs: smbd: fix typo in comment (bsc#1193629).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1193629).\n- cifs: take cifs_tcp_ses_lock for status checks (bsc#1193629).\n- cifs: track individual channel status using chans_need_reconnect (bsc#1193629).\n- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1193629).\n- cifs: update internal module number (bsc#1193629).\n- cifs: update tcpStatus during negotiate and sess setup (bsc#1193629).\n- cifs: use a different reconnect helper for non-cifsd threads (bsc#1193629).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1193629).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1193629).\n- cifs: use new enum for ses_status (bsc#1193629).\n- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1193629).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1193629).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1193629).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1193629).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1193629).\n- cifs: writeback fix (bsc#1193629).\n- clk: actions: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: at91: generated: consider range when calculating best rate (git-fixes).\n- clk: at91: sama7g5: fix parents of PDMCs\u0027 GCLK (git-fixes).\n- clk: bcm2835: fix bcm2835_clock_choose_div (git-fixes).\n- clk: bcm2835: Remove unused variable (git-fixes).\n- clk: clps711x: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: Enforce that disjoints limits are invalid (git-fixes).\n- clk: Fix clk_hw_get_clk() when dev is NULL (git-fixes).\n- clk: hisilicon: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: imx7d: Remove audio_mclk_root_clk (git-fixes).\n- clk: imx8mp: fix usb_root_clk parent (git-fixes).\n- clk: imx: Add check for kcalloc (git-fixes).\n- clk: imx: off by one in imx_lpcg_parse_clks_from_dt() (git-fixes).\n- clk: imx: scu: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes).\n- clk: Initialize orphan req_rate (git-fixes).\n- clk: jz4725b: fix mmc0 clock gating (git-fixes).\n- clk: loongson1: Terminate clk_div_table with sentinel element (git-fixes).\n- clk: nxp: Remove unused variable (git-fixes).\n- clk: qcom: clk-rcg2: Update logic to calculate D value for RCG (git-fixes).\n- clk: qcom: clk-rcg2: Update the frac table for pixel clock (git-fixes).\n- clk: qcom: gcc-msm8994: Fix gpll4 width (git-fixes).\n- clk: qcom: ipq8074: fix PCI-E clock oops (git-fixes).\n- clk: qcom: ipq8074: Use floor ops for SDCC1 clock (git-fixes).\n- clk: renesas: r9a06g032: Fix the RTC hclock description (git-fixes).\n- clk: rockchip: drop CLK_SET_RATE_PARENT from dclk_vop* on rk3568 (git-fixes).\n- clk: si5341: fix reported clk_rate when output divider is 2 (git-fixes).\n- clk: sunxi: sun9i-mmc: check return value after calling platform_get_resource() (git-fixes).\n- clk: tegra: Add missing reset deassertion (git-fixes).\n- clk: tegra: tegra124-emc: Fix missing put_device() call in emc_ensure_emc_driver (git-fixes).\n- clk: ti: Preserve node in ti_dt_clocks_register() (git-fixes).\n- clk: uniphier: Fix fixed-rate initialization (git-fixes).\n- clocksource: acpi_pm: fix return value of __setup handler (git-fixes).\n- clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts (git-fixes).\n- clocksource/drivers/exynos_mct: Refactor resources allocation (git-fixes).\n- clocksource/drivers/oxnas-rps: Fix irq_of_parse_and_map() return value (git-fixes).\n- clocksource/drivers/sp804: Avoid error on multiple instances (git-fixes).\n- clocksource/drivers/timer-microchip-pit64b: Use notrace (git-fixes).\n- clocksource/drivers/timer-of: Check return value of of_iomap in timer_of_base_init() (git-fixes).\n- clocksource/drivers/timer-ti-dm: Fix regression from errata i940 fix (git-fixes).\n- clocksource: hyper-v: unexport __init-annotated hv_init_clocksource() (bsc#1201218).\n- comedi: drivers: ni_routes: Use strcmp() instead of memcmp() (git-fixes).\n- comedi: vmk80xx: fix expression for tx buffer size (git-fixes).\n- copy_process(): Move fd_install() out of sighand-\u003esiglock critical section (bsc#1199626).\n- cpufreq: intel_pstate: Add Ice Lake server to out-of-band IDs (bsc#1201228).\n- cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse (git-fixes).\n- cpuidle,intel_idle: Fix CPUIDLE_FLAG_IRQ_ENABLE (git-fixes).\n- cpuidle: intel_idle: Update intel_idle() kerneldoc comment (git-fixes).\n- cpuset: Fix the bug that subpart_cpus updated wrongly in update_cpumask() (bsc#1196866).\n- cputime, cpuacct: Include guest time in user time in (git-fixes)\n- crypto: amlogic - call finalize with bh disabled (git-fixes).\n- crypto: api - Move cryptomgr soft dependency into algapi (git-fixes).\n- crypto: arm/aes-neonbs-cbc - Select generic cbc and aes (git-fixes).\n- crypto: authenc - Fix sleep in atomic context in decrypt_tail (git-fixes).\n- crypto: caam - fix i.MX6SX entropy delay value (git-fixes).\n- crypto: cavium/nitrox - do not cast parameter in bit operations (git-fixes).\n- crypto: ccp - ccp_dmaengine_unregister release dma channels (git-fixes).\n- crypto: ccree - do not attempt 0 len DMA mappings (git-fixes).\n- crypto: ccree - Fix use after free in cc_cipher_exit() (git-fixes).\n- crypto: ccree - use fine grained DMA mapping dir (git-fixes).\n- crypto: cryptd - Protect per-CPU resource by disabling BH (git-fixes).\n- crypto: ecrdsa - Fix incorrect use of vli_cmp (git-fixes).\n- crypto: engine - check if BH is disabled during completion (git-fixes).\n- crypto: gemini - call finalize with bh disabled (git-fixes).\n- crypto: hisilicon/qm - cleanup warning in qm_vf_read_qos (git-fixes).\n- crypto: hisilicon/sec - fix the aead software fallback for engine (git-fixes).\n- crypto: hisilicon/sec - not need to enable sm4 extra mode at HW V3 (git-fixes).\n- crypto: marvell/cesa - ECB does not IV (git-fixes).\n- crypto: mxs-dcp - Fix scatterlist processing (git-fixes).\n- crypto: octeontx2 - remove CONFIG_DM_CRYPT check (git-fixes).\n- crypto: qat - disable registration of algorithms (git-fixes).\n- crypto: qat - do not cast parameter in bit operations (git-fixes).\n- crypto: qcom-rng - ensure buffer for generate is completely filled (git-fixes).\n- crypto: qcom-rng - fix infinite loop on requests not multiple of WORD_SZ (git-fixes).\n- crypto: rockchip - ECB does not need IV (git-fixes).\n- crypto: rsa-pkcs1pad - correctly get hash from source scatterlist (git-fixes).\n- crypto: rsa-pkcs1pad - fix buffer overread in pkcs1pad_verify_complete() (git-fixes).\n- crypto: rsa-pkcs1pad - only allow with rsa (git-fixes).\n- crypto: rsa-pkcs1pad - restore signature length check (git-fixes).\n- crypto: stm32 - fix reference leak in stm32_crc_remove (git-fixes).\n- crypto: sun8i-ce - call finalize with bh disabled (git-fixes).\n- crypto: sun8i-ss - call finalize with bh disabled (git-fixes).\n- crypto: sun8i-ss - handle zero sized sg (git-fixes).\n- crypto: sun8i-ss - really disable hash on A80 (git-fixes).\n- crypto: sun8i-ss - rework handling of IV (git-fixes).\n- crypto: vmx - add missing dependencies (git-fixes).\n- crypto: x86/chacha20 - Avoid spurious jumps to other functions (git-fixes).\n- crypto: x86 - eliminate anonymous module_init and module_exit (git-fixes).\n- crypto: xts - Add softdep on ecb (git-fixes).\n- dax: fix cache flush on PMD-mapped pages (bsc#1200830).\n- devlink: Add \u0027enable_iwarp\u0027 generic device param (bsc#1200502).\n- dim: initialize all struct fields (git-fixes).\n- display/amd: decrease message verbosity about watermarks table failure (git-fixes).\n- dma: at_xdmac: fix a missing check on list iterator (git-fixes).\n- dma-buf: fix use of DMA_BUF_SET_NAME_{A,B} in userspace (git-fixes).\n- dma-buf: heaps: Fix potential spectre v1 gadget (git-fixes).\n- dma-debug: fix return value of __setup handlers (git-fixes).\n- dma-direct: avoid redundant memory sync for swiotlb (git-fixes).\n- dmaengine: dw-edma: Fix unaligned 64bit access (git-fixes).\n- dmaengine: hisi_dma: fix MSI allocate fail when reload hisi_dma (git-fixes).\n- dmaengine: idxd: add missing callback function to support DMA_INTERRUPT (git-fixes).\n- dmaengine: idxd: add RO check for wq max_batch_size write (git-fixes).\n- dmaengine: idxd: add RO check for wq max_transfer_size write (git-fixes).\n- dmaengine: idxd: check GENCAP config support for gencfg register (git-fixes).\n- dmaengine: idxd: fix device cleanup on disable (git-fixes).\n- dmaengine: idxd: Fix the error handling path in idxd_cdev_register() (git-fixes).\n- dmaengine: idxd: restore traffic class defaults after wq reset (git-fixes).\n- dmaengine: idxd: set DMA_INTERRUPT cap bit (git-fixes).\n- dmaengine: idxd: skip clearing device context when device is read-only (git-fixes).\n- dmaengine: imx-sdma: Fix error checking in sdma_event_remap (git-fixes).\n- dmaengine: mediatek:Fix PM usage reference leak of mtk_uart_apdma_alloc_chan_resources (git-fixes).\n- dmaengine: ptdma: fix concurrency issue with multiple dma transfer (jsc#SLE-21315).\n- dmaengine: ptdma: Fix the error handling path in pt_core_init() (git-fixes).\n- dmaengine: ptdma: handle the cases based on DMA is complete (jsc#SLE-21315).\n- dmaengine: Revert \u0027dmaengine: shdma: Fix runtime PM imbalance on error\u0027 (git-fixes).\n- dmaengine: shdma: Fix runtime PM imbalance on error (git-fixes).\n- dmaengine: sh: rcar-dmac: Check for error num after dma_set_max_seg_size (git-fixes).\n- dmaengine: sh: rcar-dmac: Check for error num after setting mask (git-fixes).\n- dmaengine: stm32-dmamux: Fix PM disable depth imbalance in stm32_dmamux_probe (git-fixes).\n- dmaengine: stm32-mdma: fix chan initialization in stm32_mdma_irq_handler() (git-fixes).\n- dmaengine: stm32-mdma: remove GISR1 register (git-fixes).\n- dmaengine: zynqmp_dma: In struct zynqmp_dma_chan fix desc_size data type (git-fixes).\n- dma-mapping: remove bogus test for pfn_valid from dma_map_resource (git-fixes).\n- dma/pool: create dma atomic pool only if dma zone has managed pages (bsc#1197501).\n- dm crypt: fix get_key_size compiler warning if !CONFIG_KEYS (git-fixes).\n- dm: fix use-after-free in dm_cleanup_zoned_dev() (git-fixes).\n- dm integrity: fix error code in dm_integrity_ctr() (git-fixes).\n- dm integrity: set journal entry unused when shrinking device (git-fixes).\n- dm mirror log: round up region bitmap size to BITS_PER_LONG (git-fixes).\n- dm mpath: only use ktime_get_ns() in historical selector (git-fixes).\n- dm verity: set DM_TARGET_IMMUTABLE feature flag (git-fixes).\n- doc/ip-sysctl: add bc_forwarding (git-fixes).\n- docs/conf.py: Cope with removal of language=None in Sphinx 5.0.0 (git-fixes).\n- Documentation: add link to stable release candidate tree (git-fixes).\n- Documentation: dd: Use ReST lists for return values of driver_deferred_probe_check_state() (git-fixes).\n- Documentation: Fix duplicate statement about raw_spinlock_t type (git-fixes).\n- Documentation: update stable tree link (git-fixes).\n- do not call utsname() after -\u003ensproxy is NULL (bsc#1201196).\n- drbd: fix an invalid memory access caused by incorrect use of list iterator (git-fixes).\n- drbd: fix duplicate array initializer (git-fixes).\n- drbd: Fix five use after free bugs in get_initial_state (git-fixes).\n- drbd: remove assign_p_sizes_qlim (git-fixes).\n- drbd: use bdev_alignment_offset instead of queue_alignment_offset (git-fixes).\n- drbd: use bdev based limit helpers in drbd_send_sizes (git-fixes).\n- driver base: fix an unlikely reference counting issue in __add_memory_block() (git-fixes).\n- driver base: fix compaction sysfs file leak (git-fixes).\n- driver: base: fix UAF when driver_attach failed (git-fixes).\n- driver core: dd: fix return value of __setup handler (git-fixes).\n- driver core: fix deadlock in __device_attach (git-fixes).\n- driver core: Fix wait_for_device_probe() and deferred_probe_timeout interaction (git-fixes).\n- driver core: Free DMA range map when device is released (git-fixes).\n- driver: hv: Compare cpumasks and not their weights in init_vp_index() (git-fixes).\n- driver: hv: log when enabling crash_kexec_post_notifiers (git-fixes).\n- driver: hv: Rename \u0027alloced\u0027 to \u0027allocated\u0027 (git-fixes).\n- driver: hv: utils: Make use of the helper macro LIST_HEAD() (git-fixes).\n- driver: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (git-fixes).\n- driver: hv: vmbus: Fix potential crash on module unload (git-fixes).\n- driver: hv: vmbus: Use struct_size() helper in kmalloc() (git-fixes).\n- driver: i2c: thunderx: Allow driver to work with ACPI defined TWSI controllers (git-fixes).\n- driver: net: xgene: Fix regression in CRC stripping (git-fixes).\n- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).\n- drivers: mmc: sdhci_am654: Add the quirk to set TESTCD bit (git-fixes).\n- drivers: staging: rtl8192bs: Fix deadlock in rtw_joinbss_event_prehandle() (git-fixes).\n- drivers: staging: rtl8192e: Fix deadlock in rtllib_beacons_stop() (git-fixes).\n- drivers: staging: rtl8192u: Fix deadlock in ieee80211_beacons_stop() (git-fixes).\n- drivers: staging: rtl8723bs: Fix deadlock in rtw_surveydone_event_callback() (git-fixes).\n- drivers: tty: serial: Fix deadlock in sa1100_set_termios() (git-fixes).\n- drivers: usb: host: Fix deadlock in oxu_bus_suspend() (git-fixes).\n- drm: add a locked version of drm_is_current_master (git-fixes).\n- drm: Add orientation quirk for GPD Win Max (git-fixes).\n- drm/amd: Add USBC connector ID (git-fixes).\n- drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj (git-fixes).\n- drm/amd: avoid suspend on dGPUs w/ s2idle support when runtime PM enabled (git-fixes).\n- drm/amd: Check if ASPM is enabled from PCIe subsystem (git-fixes).\n- drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug (git-fixes).\n- drm/amd/display: Add pstate verification and recovery for DCN31 (git-fixes).\n- drm/amd/display: Add signal type check when verify stream backends same (git-fixes).\n- drm/amd/display: Avoid reading audio pattern past AUDIO_CHANNELS_COUNT (git-fixes).\n- drm/amd/display: Cap OLED brightness per max frame-average luminance (git-fixes).\n- drm/amd/display: Cap pflip irqs per max otg number (git-fixes).\n- drm/amd/display: Check if modulo is 0 before dividing (git-fixes).\n- drm/amd/display: DCN3.1: do not mark as kernel-doc (git-fixes).\n- drm/amd/display: Disabling Z10 on DCN31 (git-fixes).\n- drm/amd/display: do not ignore alpha property on pre-multiplied mode (git-fixes).\n- drm/amd/display: Do not reinitialize DMCUB on s0ix resume (git-fixes).\n- drm/amd/display: Enable power gating before init_pipes (git-fixes).\n- drm/amd/display: FEC check in timing validation (git-fixes).\n- drm/amd/display: Fix allocate_mst_payload assert on resume (git-fixes).\n- drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() (git-fixes).\n- drm/amd/display: fix audio format not updated after edid updated (git-fixes).\n- drm/amd/display: Fix memory leak (git-fixes).\n- drm/amd/display: Fix memory leak in dcn21_clock_source_create (bsc#1190786)\n- drm/amd/display: Fix OLED brightness control on eDP (git-fixes).\n- drm/amd/display: Fix p-state allow debug index on dcn31 (git-fixes).\n- drm/amd/display: fix yellow carp wm clamping (git-fixes).\n- drm/amd/display: Force link_rate as LINK_RATE_RBR2 for 2018 15\u0027 Apple Retina panels (git-fixes).\n- drm/amd/display: For vblank_disable_immediate, check PSR is really used (git-fixes).\n- drm/amd/display: Protect update_bw_bounding_box FPU code (git-fixes).\n- drm/amd/display: Read Golden Settings Table from VBIOS (git-fixes).\n- drm/amd/display: Remove vupdate_int_entry definition (git-fixes).\n- drm/amd/display: Revert FEC check in validation (git-fixes).\n- drm/amd/display: Update VTEM Infopacket definition (git-fixes).\n- drm/amd/display: Update watermark values for DCN301 (git-fixes).\n- drm/amd/display: Use adjusted DCN301 watermarks (git-fixes).\n- drm/amd/display: Use PSR version selected during set_psr_caps (git-fixes).\n- drm/amd/display: watermark latencies is not enough on DCN31 (git-fixes).\n- drm/amdgpu: add beige goby PCI ID (git-fixes).\n- drm/amdgpu: bypass tiling flag check in virtual display case (v2) (git-fixes).\n- drm/amdgpu: check vm ready by amdgpu_vm-\u003eevicting flag (git-fixes).\n- drm/amdgpu: conduct a proper cleanup of PDB bo (git-fixes).\n- drm/amdgpu/cs: make commands with 0 chunks illegal behaviour (git-fixes).\n- drm/amdgpu: disable MMHUB PG for Picasso (git-fixes).\n- drm/amdgpu/display: add support for multiple backlights (git-fixes).\n- drm/amdgpu: do not do resets on APUs which do not support it (git-fixes).\n- drm/amdgpu: do not enable asic reset for raven2 (git-fixes).\n- drm/amdgpu: do not set s3 and s0ix at the same time (git-fixes).\n- drm/amdgpu: do not use BACO for reset in S3 (git-fixes).\n- drm/amdgpu: do not use passthrough mode in Xen dom0 (git-fixes).\n- drm/amdgpu: Drop inline from amdgpu_ras_eeprom_max_record_count (git-fixes).\n- drm/amdgpu: Enable gfxoff quirk on MacBook Pro (git-fixes).\n- drm/amdgpu: Ensure HDA function is suspended before ASIC reset (git-fixes).\n- drm/amdgpu: explicitly check for s0ix when evicting resources (git-fixes).\n- drm/amdgpu: fix amdgpu_ras_block_late_init error handler (bsc#1190497)\n- drm/amdgpu: fix logic inversion in check (git-fixes).\n- drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() (git-fixes).\n- drm/amdgpu: Fix recursive locking warning (git-fixes).\n- drm/amdgpu: fix suspend/resume hang regression (git-fixes).\n- drm/amdgpu/sdma: Fix incorrect calculations of the wptr of the doorbells (git-fixes).\n- drm/amdgpu: skipping SDMA hw_init and hw_fini for S0ix (git-fixes).\n- drm/amdgpu/smu10: fix SoC/fclk units in auto mode (git-fixes).\n- drm/amdgpu: suppress the warning about enum value \u0027AMD_IP_BLOCK_TYPE_NUM\u0027 (git-fixes).\n- drm/amdgpu/ucode: Remove firmware load type check in amdgpu_ucode_free_bo (git-fixes).\n- drm/amdgpu: unify BO evicting method in amdgpu_ttm (git-fixes).\n- drm/amdgpu: update VCN codec support for Yellow Carp (git-fixes).\n- drm/amdgpu/vcn: Fix the register setting for vcn1 (git-fixes).\n- drm/amdgpu/vcn: improve vcn dpg stop procedure (git-fixes).\n- drm/amdgpu: vi: disable ASPM on Intel Alder Lake based systems (bsc#1190786)\n- drm/amdkfd: add pinned BOs to kfd_bo_list (git-fixes).\n- drm/amdkfd: Check for potential null return of kmalloc_array() (git-fixes).\n- drm/amdkfd: Create file descriptor after client is added to smi_clients list (git-fixes).\n- drm/amdkfd: Do not take process mutex for svm ioctls (git-fixes).\n- drm/amdkfd: Fix GWS queue count (bsc#1190786)\n- drm/amdkfd: Fix Incorrect VMIDs passed to HWS (git-fixes).\n- drm/amdkfd: make CRAT table missing message informational only (git-fixes).\n- drm/amdkfd: remove unused function (git-fixes).\n- drm/amdkfd: Separate pinned BOs destruction from general routine (bsc#1195287).\n- drm/amdkfd: Use mmget_not_zero in MMU notifier (git-fixes).\n- drm/amd/pm: correct the MGpuFanBoost support for Beige Goby (git-fixes).\n- drm/amd/pm: correct the sequence of sending gpu reset msg (git-fixes).\n- drm/amd/pm: correct UMD pstate clocks for Dimgrey Cavefish and Beige Goby (git-fixes).\n- drm/amd/pm: enable pm sysfs write for one VF mode (git-fixes).\n- drm/amd/pm: fix hwmon node of power1_label create issue (git-fixes).\n- drm/amd/pm: Fix missing thermal throttler status (git-fixes).\n- drm/amd/pm: fix some OEM SKU specific stability issues (git-fixes).\n- drm/amd/pm: return -ENOTSUPP if there is no get_dpm_ultimate_freq function (git-fixes).\n- drm/amd/pm: update smartshift powerboost calc for smu12 (git-fixes).\n- drm/amd/pm: update smartshift powerboost calc for smu13 (git-fixes).\n- drm/amd/pm: use bitmap_{from,to}_arr32 where appropriate (git-fixes).\n- drm/ast: Create threshold values for AST2600 (bsc#1190786)\n- drm/atomic: Do not pollute crtc_state-\u003emode_blob with error pointers (git-fixes).\n- drm/atomic: Force bridge self-refresh-exit on CRTC switch (git-fixes).\n- drm: avoid circular locks in drm_mode_getconnector (git-fixes).\n- drm/blend: fix typo in the comment (git-fixes).\n- drm/bridge: Add missing pm_runtime_disable() in __dw_mipi_dsi_probe (git-fixes).\n- drm/bridge: Add missing pm_runtime_put_sync (git-fixes).\n- drm/bridge: adv7511: clean up CEC adapter when probe fails (git-fixes).\n- drm: bridge: adv7511: Fix ADV7535 HPD enablement (git-fixes).\n- drm/bridge: analogix_dp: Grab runtime PM reference for DP-AUX (git-fixes).\n- drm/bridge: analogix_dp: Support PSR-exit to disable transition (git-fixes).\n- drm/bridge: anx7625: Fix overflow issue on reading EDID (git-fixes).\n- drm/bridge: cdns-dsi: Make sure to to create proper aliases for dt (git-fixes).\n- drm/bridge: dw-hdmi: use safe format when first in bridge chain (git-fixes).\n- drm/bridge: Fix error handling in analogix_dp_probe (git-fixes).\n- drm/bridge: Fix free wrong object in sii8620_init_rcp_input_dev (git-fixes).\n- drm: bridge: fix unmet dependency on DRM_KMS_HELPER for DRM_PANEL_BRIDGE (git-fixes).\n- drm: bridge: icn6211: Fix HFP_HSW_HBP_HI and HFP_MIN handling (bsc#1190786)\n- drm: bridge: icn6211: Fix register layout (git-fixes).\n- drm: bridge: it66121: Fix the register page length (git-fixes).\n- drm/bridge: nwl-dsi: Fix PM disable depth imbalance in nwl_dsi_probe (git-fixes).\n- drm/bridge: sn65dsi83: Fix an error handling path in (bsc#1190786)\n- drm/bridge: ti-sn65dsi83: Handle dsi_lanes == 0 as invalid (git-fixes).\n- drm/bridge: ti-sn65dsi86: Properly undo autosuspend (git-fixes).\n- drm/cma-helper: Set VM_DONTEXPAND for mmap (git-fixes).\n- drm/connector: Fix typo in output format (bsc#1190786)\n- drm/doc: overview before functions for drm_writeback.c (git-fixes).\n- drm/dp: Fix OOB read when handling Post Cursor2 register (bsc#1190786)\n- drm/edid: Always set RGB444 (git-fixes).\n- drm/edid: check basic audio support on CEA extension block (git-fixes).\n- drm/edid: Do not clear formats if using deep color (git-fixes).\n- drm/edid: fix CEA extension byte #3 parsing (bsc#1190786)\n- drm/edid: fix invalid EDID extension block filtering (git-fixes).\n- drm/etnaviv: check for reaped mapping in etnaviv_iommu_unmap_gem (git-fixes).\n- drm/fb-helper: Mark screen buffers in system memory with FBINFO_VIRTFB (git-fixes).\n- drm/fourcc: fix integer type usage in uapi header (git-fixes).\n- drm/i915/adlp: Fix TypeC PHY-ready status readout (git-fixes).\n- drm/i915: Allow !join_mbus cases for adlp+ dbuf configuration (bsc#1193640).\n- drm/i915: Check EDID for HDR static metadata when choosing blc (bsc#1190497)\n- drm/i915: Correctly populate use_sagv_wm for all pipes (git-fixes).\n- drm/i915/dg2: Print PHY name properly on calibration error (git-fixes).\n- drm/i915: Disable DRRS on IVB/HSW port != A (git-fixes).\n- drm/i915/display: Fix HPD short pulse handling for eDP (git-fixes).\n- drm/i915/display: Move DRRS code its own file (git-fixes).\n- drm/i915/display/psr: Unset enable_psr2_sel_fetch if other checks in intel_psr2_config_valid() fails (git-fixes).\n- drm/i915/display: split out dpt out of intel_display.c (git-fixes).\n- drm/i915/dmc: Add MMIO range restrictions (git-fixes).\n- drm/i915/dsi: fix VBT send packet port selection for ICL+ (git-fixes).\n- drm/i915: Fix bw atomic check when switching between SAGV vs. no SAGV (git-fixes).\n- drm/i915: Fix CFI violation with show_dynamic_id() (git-fixes).\n- drm/i915: Fix dbuf slice config lookup (git-fixes bsc#1193640).\n- drm/i915: Fix mbus join config lookup (git-fixes bsc#1193640).\n- drm/i915: Fix PSF GV point mask when SAGV is not possible (git-fixes).\n- drm/i915: Fix race in __i915_vma_remove_closed (bsc#1190497)\n- drm/i915: Fix SEL_FETCH_PLANE_*(PIPE_B+) register addresses (bsc#1190497)\n- drm/i915: Fix -Wstringop-overflow warning in call to intel_read_wm_latency() (git-fixes).\n- drm/i915/gem: add missing boundary check in vm_access (git-fixes).\n- drm/i915/gem: add missing else (git-fixes).\n- drm/i915/guc/slpc: Correct the param count for unset param (git-fixes).\n- drm/i915/gvt: clean up kernel-doc in gtt.c (git-fixes).\n- drm/i915/gvt: Make DRM_I915_GVT depend on X86 (git-fixes).\n- drm/i915: Implement w/a 22010492432 for adl-s (git-fixes).\n- drm/i915: Keep gem ctx-\u003evm alive until the final put (bsc#1190497)\n- drm/i915/opregion: check port number bounds for SWSCI display power state (git-fixes).\n- drm/i915/overlay: Prevent divide by zero bugs in scaling (git-fixes).\n- drm/i915: Populate pipe dbuf slices more accurately during readout (bsc#1193640).\n- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).\n- drm/i915: s/JSP2/ICP2/ PCH (git-fixes).\n- drm/i915: Treat SAGV block time 0 as SAGV disabled (git-fixes).\n- drm/i915/ttm: ensure we unmap when purging (git-fixes).\n- drm/i915/ttm: tweak priority hint selection (git-fixes).\n- drm/i915: Widen the QGV point mask (git-fixes).\n- drm/i915: Workaround broken BIOS DBUF configuration on TGL/RKL (bsc#1193640).\n- drm/imx: dw_hdmi-imx: Fix bailout in error cases of probe (git-fixes).\n- drm: imx: fix compiler warning with gcc-12 (git-fixes).\n- drm/imx: Fix memory leak in imx_pd_connector_get_modes (git-fixes).\n- drm/imx: imx-ldb: Check for null pointer after calling kmemdup (git-fixes).\n- drm/imx: parallel-display: Remove bus flags check in imx_pd_bridge_atomic_check() (git-fixes).\n- drm/kmb: Fix for build errors with Warray-bounds (git-fixes).\n- drm/komeda: Fix an undefined behavior bug in komeda_plane_add() (git-fixes).\n- drm/komeda: return early if drm_universal_plane_init() fails (git-fixes).\n- drm: mali-dp: potential dereference of null pointer (git-fixes).\n- drm/mediatek: Add vblank register/unregister callback functions (bsc#1190768)\n- drm/mediatek: dpi: Use mt8183 output formats for mt8192 (git-fixes).\n- drm/mediatek: Fix mtk_cec_mask() (git-fixes).\n- drm/mediatek: mtk_dsi: Reset the dsi0 hardware (git-fixes).\n- drm/meson: Fix error handling when afbcd.ops-\u003einit fails (git-fixes).\n- drm/meson: Make use of the helper function devm_platform_ioremap_resourcexxx() (git-fixes).\n- drm/meson: osd_afbcd: Add an exit callback to struct meson_afbcd_ops (git-fixes).\n- drm/meson: split out encoder from meson_dw_hdmi (git-fixes).\n- drm/msm/a6xx: Fix missing ARRAY_SIZE() check (git-fixes).\n- drm/msm/a6xx: Fix refcount leak in a6xx_gpu_init (git-fixes).\n- drm/msm: add missing include to msm_drv.c (git-fixes).\n- drm/msm: Add missing put_task_struct() in debugfs path (git-fixes).\n- drm/msm/disp: check the return value of kzalloc() (git-fixes).\n- drm/msm/disp/dpu1: set mdp clk to the maximum frequency in opp table (bsc#1190768)\n- drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume (git-fixes).\n- drm/msm/dp: add fail safe mode outside of event_mutex context (git-fixes).\n- drm/msm/dp: always add fail-safe mode into connector mode list (git-fixes).\n- drm/msm/dp: Always clear mask bits to disable interrupts at dp_ctrl_reset_irq_ctrl() (git-fixes).\n- drm/msm/dp: check core_initialized before disable interrupts at dp_display_unbind() (git-fixes).\n- drm/msm/dp: do not initialize phy until plugin interrupt received (bsc#1190497)\n- drm/msm/dp: do not stop transmitting phy test pattern during DP phy compliance test (git-fixes).\n- drm/msm/dp: dp_link_parse_sink_count() return immediately if aux read failed (git-fixes).\n- drm/msm/dp: fix error check return value of irq_of_parse_and_map() (git-fixes).\n- drm/msm/dp: fix event thread stuck in wait_event after kthread_stop() (git-fixes).\n- drm/msm/dp: force link training for display resolution change (git-fixes).\n- drm/msm/dp: Modify prototype of encoder based API (git-fixes).\n- drm/msm/dp: populate connector of struct dp_panel (git-fixes).\n- drm/msm/dp: remove fail safe mode related code (git-fixes).\n- drm/msm/dp: reset DP controller before transmit phy test pattern (git-fixes).\n- drm/msm/dp: stop event kernel thread when DP unbind (bsc#1190768)\n- drm/msm/dp: stop link training after link training 2 failed (git-fixes).\n- drm/msm/dp: tear down main link at unplug handle immediately (bsc#1190768)\n- drm/msm/dpu: add DSPP blocks teardown (git-fixes).\n- drm/msm/dpu: adjust display_v_end for eDP and DP (git-fixes).\n- drm/msm/dpu: fix dp audio condition (git-fixes).\n- drm/msm/dpu: fix error check return value of irq_of_parse_and_map() (bsc#1190768)\n- drm/msm/dpu: handle pm_runtime_get_sync() errors in bind path (git-fixes).\n- drm/msm/dsi: fix address for second DSI PHY on SDM660 (git-fixes).\n- drm/msm/dsi: fix error checks and return values for DSI xmit functions (git-fixes).\n- drm/msm/dsi: Remove spurious IRQF_ONESHOT flag (git-fixes).\n- drm/msm/dsi: Use connector directly in msm_dsi_manager_connector_init() (git-fixes).\n- drm/msm/dsi: Use \u0027ref\u0027 fw clock instead of global name for VCO parent (git-fixes).\n- drm/msm: Fix double pm_runtime_disable() call (git-fixes).\n- drm: msm: fix error check return value of irq_of_parse_and_map() (git-fixes).\n- drm: msm: fix possible memory leak in mdp5_crtc_cursor_set() (git-fixes).\n- drm/msm: Fix range size vs end confusion (git-fixes).\n- drm/msm/hdmi: check return value after calling platform_get_resource_byname() (git-fixes).\n- drm/msm/hdmi: fix error check return value of irq_of_parse_and_map() (git-fixes).\n- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).\n- drm/msm/mdp5: check the return of kzalloc() (git-fixes).\n- drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected (git-fixes).\n- drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected (git-fixes).\n- drm/msm: properly add and remove internal bridges (bsc#1190768)\n- drm/msm: remove unused plane_property field from msm_drm_private (bsc#1190768)\n- drm/msm: return an error pointer in msm_gem_prime_get_sg_table() (git-fixes).\n- drm/msm: Switch ordering of runpm put vs devfreq_idle (git-fixes).\n- drm/msm: use for_each_sgtable_sg to iterate over scatterlist (git-fixes).\n- drm/nouveau/acr: Fix undefined behavior in nvkm_acr_hsfw_load_bl() (git-fixes).\n- drm/nouveau/backlight: Just set all backlight types as RAW (git-fixes).\n- drm/nouveau/clk: Fix an incorrect NULL check on list iterator (git-fixes).\n- drm/nouveau: Fix a potential theorical leak in nouveau_get_backlight_name() (git-fixes).\n- drm/nouveau: fix off by one in BIOS boundary checking (git-fixes).\n- drm/nouveau/kms/nv50-: atom: fix an incorrect NULL check on list iterator (git-fixes).\n- drm/nouveau/pmu: Add missing callbacks for Tegra devices (git-fixes).\n- drm/nouveau/pmu/gm200-: use alternate falcon reset sequence (git-fixes).\n- drm/nouveau/subdev/bus: Ratelimit logging for fault errors (git-fixes).\n- drm/nouveau/tegra: Stop using iommu_present() (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the 1Netbook OneXPlayer (git-fixes).\n- drm/panel: panel-simple: Fix proper bpc for AM-1280800N3TZQW-T00H (git-fixes).\n- drm/panel/raspberrypi-touchscreen: Avoid NULL deref if not initialised (git-fixes).\n- drm/panel/raspberrypi-touchscreen: Initialise the bridge in prepare (git-fixes).\n- drm/panel: simple: Add missing bus flags for Innolux G070Y2-L01 (git-fixes).\n- drm/panel: simple: Assign data from panel_dpi_probe() correctly (git-fixes).\n- drm/panel: simple: Fix Innolux G070Y2-L01 BPP settings (git-fixes).\n- drm/panfrost: Check for error num after setting mask (git-fixes).\n- drm/plane: Move range check for format_count earlier (git-fixes).\n- drm/radeon: fix a possible null pointer dereference (git-fixes).\n- drm/radeon: Fix backlight control on iMac 12,1 (git-fixes).\n- drm/rockchip: dw_hdmi: Do not leave clock enabled in error case (git-fixes).\n- drm/rockchip: vop: Correct RK3399 VOP register fields (git-fixes).\n- drm/rockchip: vop: fix possible null-ptr-deref in vop_bind() (git-fixes).\n- drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode (git-fixes).\n- drm/simpledrm: Add \u0027panel orientation\u0027 property on non-upright mounted LCD panels (git-fixes).\n- drm: sti: do not use kernel-doc markers (git-fixes).\n- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).\n- drm/sun4i: mixer: Fix P010 and P210 format numbers (git-fixes).\n- drm/sun4i: Remove obsolete references to PHYS_OFFSET (bsc#1190786)\n- drm/syncobj: flatten dma_fence_chains on transfer (git-fixes).\n- drm/tegra: Add back arm_iommu_detach_device() (git-fixes).\n- drm/tegra: Fix reference leak in tegra_dsi_ganged_probe (git-fixes).\n- drm: use the lookup lock in drm_is_current_master (git-fixes).\n- drm/v3d/v3d_drv: Check for error num after setting mask (git-fixes).\n- drm/vc4: crtc: Fix runtime_pm reference counting (git-fixes).\n- drm/vc4: Fix deadlock on DSI device attach error (git-fixes).\n- drm/vc4: hdmi: Add debugfs prefix (bsc#1199163).\n- drm/vc4: hdmi: Allow DBLCLK modes even if horz timing is odd (git-fixes).\n- drm/vc4: hdmi: Fix build error for implicit function declaration (git-fixes).\n- drm/vc4: hdmi: Fix HPD GPIO detection (git-fixes).\n- drm/vc4: hdmi: Make sure the device is powered with CEC (git-fixes).\n- drm/vc4: hdmi: Split the CEC disable / enable functions in two (git-fixes).\n- drm/vc4: hvs: Fix frame count register readout (git-fixes).\n- drm/vc4: hvs: Reset muxes at probe time (git-fixes).\n- drm/vc4: txp: Do not set TXP_VSTART_AT_EOF (git-fixes).\n- drm/vc4: txp: Force alpha to be 0xff if it\u0027s disabled (git-fixes).\n- drm/vc4: Use pm_runtime_resume_and_get to fix pm_runtime_get_sync() usage (git-fixes).\n- drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() (git-fixes).\n- drm/virtio: fix NULL pointer dereference in virtio_gpu_conn_get_modes (git-fixes).\n- drm/vmwgfx: Disable command buffers on svga3 without gbobjects (git-fixes).\n- drm/vmwgfx: Fix fencing on SVGAv3 (git-fixes).\n- drm/vmwgfx: Initialize drm_mode_fb_cmd2 (git-fixes).\n- drm/vmwgfx: Remove unused compile options (bsc#1190786)\n- drm/vmwgfx: validate the screen formats (git-fixes).\n- drm/vrr: Set VRR capable prop only if it is attached to connector (git-fixes).\n- dt-bindings: arm: bcm: fix BCM53012 and BCM53016 SoC strings (git-fixes).\n- dt-bindings: can: tcan4x5x: fix mram-cfg RX FIFO config (git-fixes).\n- dt-bindings: display: sitronix, st7735r: Fix backlight in example (git-fixes).\n- dt-bindings: gpio: altera: correct interrupt-cells (git-fixes).\n- dt-bindings: memory: mtk-smi: No need mediatek,larb-id for mt8167 (git-fixes).\n- dt-bindings: mtd: nand-controller: Fix a comment in the examples (git-fixes).\n- dt-bindings: mtd: nand-controller: Fix the reg property description (git-fixes).\n- dt-bindings: net: xgmac_mdio: Remove unsupported \u0027bus-frequency\u0027 (git-fixes).\n- dt-bindings: PCI: xilinx-cpm: Fix reg property order (git-fixes).\n- dt-bindings: phy: uniphier-usb3hs: Fix incorrect clock-names and reset-names (git-fixes).\n- dt-bindings: pinctrl: aspeed-g6: remove FWQSPID group (git-fixes).\n- dt-bindings: pinctrl: pinctrl-microchip-sgpio: Fix example (git-fixes).\n- dt-bindings: spi: mxic: The interrupt property is not mandatory (git-fixes).\n- dt-bindings: usb: ehci: Increase the number of PHYs (git-fixes).\n- dt-bindings: usb: hcd: correct usb-device path (git-fixes).\n- dt-bindings: usb: ohci: Increase the number of PHYs (git-fixes).\n- dt-bindings: watchdog: Require samsung,syscon-phandle for Exynos7 (git-fixes).\n- e1000e: Correct NVM checksum verification flow (bsc#1191663).\n- e1000e: Fix possible HW unit hang after an s0ix exit (jsc#SLE-18382).\n- e1000e: Fix possible overflow in LTR decoding (git-fixes).\n- e1000e: Handshake with CSME starts from ADL platforms (git-fixes).\n- e1000e: Separate ADP board type from TGP (git-fixes).\n- EDAC/altera: Fix deferred probing (bsc#1190497).\n- EDAC/amd64: Add new register offset support and related changes (jsc#SLE-19026).\n- EDAC/amd64: Set memory type per DIMM (jsc#SLE-19026).\n- EDAC: Fix calculation of returned address and next offset in edac_align_ptr() (bsc#1190497).\n- EDAC/synopsys: Read the error count from the correct register (bsc#1190497).\n- EDAC/xgene: Fix deferred probing (bsc#1190497).\n- eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX (git-fixes).\n- efi: Add missing prototype for efi_capsule_setup_info (git-fixes).\n- efi: Do not import certificates from UEFI Secure Boot for T2 Macs (git-fixes).\n- efi: fix return value of __setup handlers (git-fixes).\n- efivars: Respect \u0027block\u0027 flag in efivar_entry_set_safe() (git-fixes).\n- epic100: fix use after free on rmmod (git-fixes).\n- ethernet/sfc: remove redundant rc variable (bsc#1196306).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext2: correct max file size computing (bsc#1197820).\n- ext4: avoid trim error on fs with small groups (bsc#1191271).\n- ext4: destroy ext4_fc_dentry_cachep kmemcache on module removal (bsc#1197917).\n- ext4: fix an use-after-free issue about data=journal writeback mode (bsc#1195482).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix ext4_fc_stats trace point (git-fixes).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- ext4: reject the \u0027commit\u0027 option on ext2 filesystems (bsc#1200808).\n- extcon: Modify extcon device to be created after driver data is set (git-fixes).\n- extcon: ptn5150: Add queue work sync before driver release (git-fixes).\n- faddr2line: Fix overlapping text section failures, the sequel (git-fixes).\n- fbcon: Avoid \u0027cap\u0027 set but not used warning (bsc#1190786)\n- fbcon: Consistently protect deferred_takeover with console_lock() (git-fixes).\n- firewire: core: extend card-\u003elock in fw_core_handle_bus_reset (git-fixes).\n- firewire: fix potential uaf in outbound_phy_packet_callback() (git-fixes).\n- firewire: remove check of list iterator against head past the loop body (git-fixes).\n- firmware: arm_ffa: Fix uuid parameter to ffa_partition_probe (git-fixes).\n- firmware: arm_ffa: Remove incorrect assignment of driver_data (git-fixes).\n- firmware: arm_scmi: Fix list protocols enumeration in the base protocol (git-fixes).\n- firmware: arm_scmi: Fix sorting of retrieved clock rates (git-fixes).\n- firmware: arm_scmi: Remove space in MODULE_ALIAS name (git-fixes).\n- firmware: arm_scmi: Validate BASE_DISCOVER_LIST_PROTOCOLS response (git-fixes).\n- firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle (git-fixes).\n- firmware: google: Properly state IOMEM dependency (git-fixes).\n- firmware: qcom: scm: Remove reassignment to desc following initializer (git-fixes).\n- firmware: stratix10-svc: add missing callback parameter on RSU (git-fixes).\n- firmware: stratix10-svc: fix a missing check on list iterator (git-fixes).\n- firmware: sysfb: fix platform-device leak in error path (git-fixes).\n- firmware: ti_sci: Fix compilation failure when CONFIG_TI_SCI_PROTOCOL is not defined (git-fixes).\n- firmware: use kernel credentials when reading firmware (git-fixes).\n- fs: fd tables have to be multiples of BITS_PER_LONG (bsc#1200827).\n- fs: fix fd table size alignment properly (bsc#1200882).\n- fs: handle circular mappings correctly (bsc#1197918).\n- fsl_lpuart: Do not enable interrupts too early (git-fixes).\n- fsnotify: Do not insert unmergeable events in hashtable (bsc#1197922).\n- fsnotify: fix fsnotify hooks in pseudo filesystems (bsc#1195944 bsc#1195478).\n- fsnotify: fix wrong lockdep annotations (bsc#1200815).\n- ftrace: Clean up hash direct_functions on register failures (git-fixes).\n- fuse: fix fileattr op failure (bsc#1197292).\n- gen_init_cpio: fix short read file handling (bsc#1193289).\n- genirq/affinity: Consider that CPUs on nodes can be (git-fixes)\n- genirq: Synchronize interrupt thread startup (git-fixes)\n- gianfar: ethtool: Fix refcount leak in gfar_get_ts_info (git-fixes).\n- gma500: fix an incorrect NULL check on list iterator (git-fixes).\n- gpio: adp5588: Remove support for platform setup and teardown callbacks (git-fixes).\n- gpio: aggregator: Fix calling into sleeping GPIO controllers (git-fixes).\n- gpio: dwapb: Do not print error on -EPROBE_DEFER (git-fixes).\n- gpio: gpio-vf610: do not touch other bits when set the target bit (git-fixes).\n- gpiolib: acpi: Convert ACPI value of debounce to microseconds (git-fixes).\n- gpiolib: acpi: use correct format characters (git-fixes).\n- gpiolib: Never return internal error codes to user space (git-fixes).\n- gpiolib: of: fix bounds check for \u0027gpio-reserved-ranges\u0027 (git-fixes).\n- gpio: mvebu: drop pwm base assignment (git-fixes).\n- gpio: mvebu/pwm: Refuse requests with inverted polarity (git-fixes).\n- gpio: pca953x: fix irq_stat not updated when irq is disabled (irq_mask not set) (git-fixes).\n- gpio: pca953x: use the correct register address to do regcache sync (git-fixes).\n- gpio: Return EPROBE_DEFER if gc-\u003eto_irq is NULL (git-fixes).\n- gpio: Revert regression in sysfs-gpio (gpiolib.c) (git-fixes).\n- gpio: sifive: use the correct register to read output values (git-fixes).\n- gpio: tegra186: Fix chip_data type confusion (git-fixes).\n- gpio: ts4900: Do not set DAT and OE together (git-fixes).\n- gpio: visconti: Fix fwnode of GPIO IRQ (git-fixes).\n- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).\n- gpu: host1x: Fix a memory leak in \u0027host1x_remove()\u0027 (git-fixes).\n- gpu: ipu-v3: Fix dev_dbg frequency output (git-fixes).\n- gup: Turn fault_in_pages_{readable,writeable} into fault_in_{readable,writeable} (git-fixes).\n- gve: Fix GFP flags when allocing pages (git-fixes).\n- gve: fix the wrong AdminQ buffer queue index check (git-fixes).\n- habanalabs: Add check for pci_enable_device (git-fixes).\n- habanalabs: fix possible memory leak in MMU DR fini (git-fixes).\n- hamradio: fix macro redefine warning (git-fixes).\n- hex2bin: fix access beyond string end (git-fixes).\n- HID: add mapping for KEY_ALL_APPLICATIONS (git-fixes).\n- HID: add mapping for KEY_DICTATE (git-fixes).\n- HID: Add support for open wheel and no attachment to T300 (git-fixes).\n- HID:Add support for UGTABLET WP5540 (git-fixes).\n- HID: amd_sfh: Add illuminance mask to limit ALS max value (git-fixes).\n- HID: amd_sfh: Correct the structure field name (git-fixes).\n- HID: amd_sfh: Modify the bus name (git-fixes).\n- HID: amd_sfh: Modify the hid name (git-fixes).\n- HID: bigben: fix slab-out-of-bounds Write in bigben_probe (git-fixes).\n- hide appended member supports_dynamic_smps_6ghz (git-fixes).\n- HID: elan: Fix potential double free in elan_input_configured (git-fixes).\n- HID: hid-led: fix maximum brightness for Dream Cheeky (git-fixes).\n- HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts (git-fixes).\n- HID: i2c-hid: fix GET/SET_REPORT for unnumbered reports (git-fixes).\n- HID: intel-ish-hid: Use dma_alloc_coherent for firmware update (git-fixes).\n- HID: logitech-dj: add new lightspeed receiver id (git-fixes).\n- HID: multitouch: add quirks to enable Lenovo X12 trackpoint (git-fixes).\n- HID: multitouch: Add support for Google Whiskers Touchpad (git-fixes).\n- HID: multitouch: fix Dell Precision 7550 and 7750 button type (bsc#1197243).\n- HID: vivaldi: fix sysfs attributes leak (git-fixes).\n- hinic: fix bug of wq out of bound access (git-fixes).\n- hv_balloon: rate-limit \u0027Unhandled message\u0027 warning (git-fixes).\n- hv_netvsc: Add check for kvmalloc_array (git-fixes).\n- hv_utils: Add comment about max VMbus packet size in VSS driver (git-fixes).\n- hwmon: (dell-smm) Speed up setting of fan speed (git-fixes).\n- hwmon: (f71882fg) Fix negative temperature (git-fixes).\n- hwmon: Handle failure to register sensor with thermal zone correctly (git-fixes).\n- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).\n- hwmon: (ltq-cputemp) restrict it to SOC_XWAY (git-fixes).\n- hwmon: (pmbus) Add mutex to regulator ops (git-fixes).\n- hwmon: (pmbus) Add Vin unit off handling (git-fixes).\n- hwmon: (pmbus) Check PEC support before reading other registers (git-fixes).\n- hwmon: (pmbus) Clear pmbus fault/warning bits after read (git-fixes).\n- hwmon: (pmbus) disable PEC if not enabled (git-fixes).\n- hwmon: (sch56xx-common) Replace WDOG_ACTIVE with WDOG_HW_RUNNING (git-fixes).\n- hwmon: (tmp401) Add OF device ID table (git-fixes).\n- hwrng: atmel - disable trng on failure path (git-fixes).\n- hwrng: cavium - Check health status while reading random data (git-fixes).\n- hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes).\n- hwrng: nomadik - Change clk_disable to clk_disable_unprepare (git-fixes).\n- hwrng: omap3-rom - fix using wrong clk_disable() in omap_rom_rng_runtime_resume() (git-fixes).\n- i2c: at91: Initialize dma_buf in at91_twi_xfer() (git-fixes).\n- i2c: at91: use dma safe buffers (git-fixes).\n- i2c: bcm2835: Avoid clock stretching timeouts (git-fixes).\n- i2c: bcm2835: Fix the error handling in \u0027bcm2835_i2c_probe()\u0027 (git-fixes).\n- i2c: bcm2835: Use platform_get_irq() to get the interrupt (git-fixes).\n- i2c: brcmstb: fix support for DSL and CM variants (git-fixes).\n- i2c: cadence: Increase timeout per message if necessary (git-fixes).\n- i2c: designware: Use standard optional ref clock implementation (git-fixes).\n- i2c: dev: Force case user pointers in compat_i2cdev_ioctl() (git-fixes).\n- i2c: ismt: prevent memory corruption in ismt_access() (git-fixes).\n- i2c: ismt: Provide a DMA buffer for Interrupt Cause Logging (git-fixes).\n- i2c: meson: Fix wrong speed use from probe (git-fixes).\n- i2c: mt7621: fix missing clk_disable_unprepare() on error in mtk_i2c_probe() (git-fixes).\n- i2c: mux: demux-pinctrl: do not deactivate a master that is not active (git-fixes).\n- i2c: npcm7xx: Add check for platform_driver_register (git-fixes).\n- i2c: npcm: Correct register access width (git-fixes).\n- i2c: npcm: Fix timeout calculation (git-fixes).\n- i2c: npcm: Handle spurious interrupts (git-fixes).\n- i2c: piix4: Add EFCH MMIO support for SMBus port select (git-fixes).\n- i2c: piix4: Add EFCH MMIO support to region request and release (git-fixes).\n- i2c: piix4: Add EFCH MMIO support to SMBus base address detect (git-fixes).\n- i2c: piix4: Enable EFCH MMIO for Family 17h+ (git-fixes).\n- i2c: piix4: Move port I/O region request/release code into functions (git-fixes).\n- i2c: piix4: Move SMBus controller base address detect into function (git-fixes).\n- i2c: piix4: Move SMBus port selection into function (git-fixes).\n- i2c: piix4: Replace hardcoded memory map size with a #define (git-fixes).\n- i2c: qcom-cci: do not delete an unregistered adapter (git-fixes).\n- i2c: qcom-cci: do not put a device tree node before i2c_add_adapter() (git-fixes).\n- i2c: rcar: fix PM ref counts in probe error paths (git-fixes).\n- i2c: xiic: Make bus names unique (git-fixes).\n- i40e: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- i40e: Fix for failed to init adminq while VF reset (git-fixes).\n- i40e: Fix issue when maximum queues is exceeded (git-fixes).\n- i40e: Fix queues reservation for XDP (git-fixes).\n- i40e: Fix reset bw limit when DCB enabled with 1 TC (git-fixes).\n- i40e: Fix reset path while removing the driver (git-fixes).\n- i40e: fix unsigned stat widths (git-fixes).\n- i40e: i40e_main: fix a missing check on list iterator (git-fixes).\n- i40e: Increase delay to 1 s after global EMP reset (git-fixes).\n- i40e: remove dead stores on XSK hotpath (jsc#SLE-18378).\n- i40e: respect metadata on XSK Rx to skb (git-fixes).\n- i40e: stop disabling VFs due to PF error responses (jsc#SLE-18378).\n- iavf: Add waiting so the port is initialized in remove (jsc#SLE-18385).\n- iavf: Fix deadlock in iavf_reset_task (jsc#SLE-18385).\n- iavf: Fix double free in iavf_reset_task (jsc#SLE-18385).\n- iavf: Fix handling of vlan strip virtual channel messages (jsc#SLE-18385).\n- iavf: Fix hang during reboot/shutdown (jsc#SLE-18385).\n- iavf: Fix __IAVF_RESETTING state usage (jsc#SLE-18385).\n- iavf: Fix init state closure on remove (jsc#SLE-18385).\n- iavf: Fix locking for VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS (jsc#SLE-18385).\n- iavf: Fix missing check for running netdev (git-fixes).\n- iavf: Fix race in init state (jsc#SLE-18385).\n- iavf: Rework mutexes for better synchronisation (jsc#SLE-18385 stable-5.14.6).\n- IB/cma: Allow XRC INI QPs to set their local ACK timeout (git-fixes).\n- IB/cm: Cancel mad on the DREQ event when the state is MRA_REP_RCVD (git-fixes).\n- IB/cm: Release previously acquired reference counter in the cm_id_priv (git-fixes).\n- IB/hfi1: Allow larger MTU without AIP (git-fixes).\n- IB/hfi1: Fix AIP early init panic (git-fixes).\n- IB/hfi1: Fix alloc failure with larger txqueuelen (git-fixes).\n- IB/hfi1: Fix panic with larger ipoib send_queue_size (jsc#SLE-19242).\n- IB/hfi1: Fix tstats alloc and dealloc (git-fixes).\n- IB/mlx5: Expose NDR speed through MAD (bsc#1196930).\n- ibmvnic: do not release napi in __ibmvnic_open() (bsc#1195668 ltc#195811).\n- ibmvnic: fix race between xmit and reset (bsc#1197302 ltc#197259).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- ibmvnic: schedule failover only if vioctl fails (bsc#1196400 ltc#195815).\n- IB/qib: Fix duplicate sysfs directory name (git-fixes).\n- IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition (git-fixes).\n- IB/rdmavt: Validate remote_addr during loopback atomic tests (git-fixes).\n- ice: allow creating VFs for !CONFIG_NET_SWITCHDEV (jsc#SLE-18375).\n- ice: check the return of ice_ptp_gettimex64 (git-fixes).\n- ice: clear cmd_type_offset_bsz for TX rings (jsc#SLE-18375).\n- ice: Clear default forwarding VSI during VSI release (git-fixes).\n- ice: clear stale Tx queue settings before configuring (git-fixes).\n- ice: do not allow to run ice_send_event_to_aux() in atomic ctx (git-fixes).\n- ice: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- ice: Do not use GFP_KERNEL in atomic context (git-fixes).\n- ice: enable parsing IPSEC SPI headers for RSS (git-fixes).\n- ice: fix an error code in ice_cfg_phy_fec() (git-fixes).\n- ice: fix concurrent reset and removal of VFs (git-fixes).\n- ice: fix crash in switchdev mode (jsc#SLE-18375).\n- ice: Fix curr_link_speed advertised speed (git-fixes).\n- ice: Fix incorrect locking in ice_vc_process_vf_msg() (jsc#SLE-18375).\n- ice: fix IPIP and SIT TSO offload (git-fixes).\n- ice: fix NULL pointer dereference in ice_update_vsi_tx_ring_stats() (jsc#SLE-18375).\n- ice: fix PTP stale Tx timestamps cleanup (git-fixes).\n- ice: fix setting l4 port flag when adding filter (jsc#SLE-18375).\n- ice: fix use-after-free when deinitializing mailbox snapshot (git-fixes).\n- ice: initialize local variable \u0027tlv\u0027 (git-fixes).\n- ice: kabi protect ice_pf (bsc#1200502).\n- ice: Protect vf_state check by cfg_lock in ice_vc_process_vf_msg() (jsc#SLE-18375).\n- ice: respect metadata on XSK Rx to skb (git-fixes).\n- ice: synchronize_rcu() when terminating rings (git-fixes).\n- ice: xsk: Fix indexing in ice_tx_xsk_pool() (jsc#SLE-18375).\n- ice: xsk: fix VSI state check in ice_xsk_wakeup() (git-fixes).\n- igb: refactor XDP registration (git-fixes).\n- igc: avoid kernel warning when changing RX ring parameters (git-fixes).\n- igc: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- igc: Fix BUG: scheduling while atomic (git-fixes).\n- igc: Fix infinite loop in release_swfw_sync (git-fixes).\n- igc: Fix suspending when PTM is active (jsc#SLE-18377).\n- igc: igc_read_phy_reg_gpy: drop premature return (git-fixes).\n- igc: igc_write_phy_reg_gpy: drop premature return (git-fixes).\n- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).\n- iio: accel: fxls8962af: add padding to regmap for SPI (git-fixes).\n- iio:accel:kxcjk-1013: rearrange iio trigger get and register (git-fixes).\n- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).\n- iio: accel: mma8452: use the correct logic to get mma8452_data (git-fixes).\n- iio:accel:mxc4005: rearrange iio trigger get and register (git-fixes).\n- iio: adc: ad7124: fix mask used for setting AIN_BUFP and AIN_BUFM bits (git-fixes).\n- iio: adc: ad7124: Remove shift from scan_type (git-fixes).\n- iio: adc: Add check for devm_request_threaded_irq (git-fixes).\n- iio: adc: adi-axi-adc: Fix refcount leak in adi_axi_adc_attach_client (git-fixes).\n- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).\n- iio: adc: men_z188_adc: Fix a resource leak in an error handling path (git-fixes).\n- iio: adc: sc27xx: Fine tune the scale calibration values (git-fixes).\n- iio: adc: sc27xx: fix read big scale voltage not right (git-fixes).\n- iio: adc: stm32: Fix ADCs iteration in irq handler (git-fixes).\n- iio: adc: stm32: Fix IRQs on STM32F4 by removing custom spurious IRQs message (git-fixes).\n- iio: adc: stm32: fix maximum clock rate for stm32mp15x (git-fixes).\n- iio: adc: stmpe-adc: Fix wait_for_completion_timeout return value check (git-fixes).\n- iio: adc: ti-ads131e08: add missing fwnode_handle_put() in ads131e08_alloc_channels() (git-fixes).\n- iio: adc: tsc2046: fix memory corruption by preventing array overflow (git-fixes).\n- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).\n- iio: afe: rescale: Fix boolean logic bug (git-fixes).\n- iio: afe: rescale: use s64 for temporary scale calculations (git-fixes).\n- iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL (git-fixes).\n- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).\n- iio: dac: ad5446: Fix read_raw not returning set value (git-fixes).\n- iio: dac: ad5592r: Fix the missing return value (git-fixes).\n- iio: dummy: iio_simple_dummy: check the return value of kstrdup() (git-fixes).\n- iio: Fix error handling for PM (git-fixes).\n- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).\n- iio:humidity:hts221: rearrange iio trigger get and register (git-fixes).\n- iio:imu:adis16480: fix buffering for devices with no burst mode (git-fixes).\n- iio:imu:bmi160: disable regulator in error path (git-fixes).\n- iio: imu: inv_icm42600: Fix I2C init possible nack (git-fixes).\n- iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot (git-fixes).\n- iio: inkern: apply consumer scale on IIO_VAL_INT cases (git-fixes).\n- iio: inkern: apply consumer scale when no channel scale is available (git-fixes).\n- iio: inkern: make a best effort on offset calculation (git-fixes).\n- iio: magnetometer: ak8975: Fix the error handling in ak8975_power_on() (git-fixes).\n- iio: magnetometer: yas530: Fix memchr_inv() misuse (git-fixes).\n- iio: mma8452: Fix probe failing when an i2c_device_id is used (git-fixes).\n- iio: mma8452: fix probe fail when device tree compatible is used (git-fixes).\n- iio: proximity: vl53l0x: Fix return value check of wait_for_completion_timeout (git-fixes).\n- iio: st_sensors: Add a local lock for protecting odr (git-fixes).\n- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).\n- ima: Allow template selection with ima_template[_fmt]= after ima_hash= (git-fixes).\n- ima: Do not print policy rule with inactive LSM labels (git-fixes).\n- ima: fix reference leak in asymmetric_verify() (git-fixes).\n- ima: Remove ima_policy file before directory (git-fixes).\n- init: call time_init() before rand_initialize() (git-fixes).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- init/main.c: return 1 from handled __setup() functions (git-fixes).\n- initramfs: Check timestamp to prevent broken cpio archive (bsc#1193289).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- Input: add bounds checking to input_set_capability() (git-fixes).\n- Input: aiptek - properly check endpoint type (git-fixes).\n- Input: bcm5974 - set missing URB_NO_TRANSFER_DMA_MAP urb flag (git-fixes).\n- Input: clear BTN_RIGHT/MIDDLE on buttonpads (git-fixes).\n- Input: elan_i2c: Add deny list for Lenovo Yoga Slim 7 (bsc#1193064).\n- Input: elan_i2c - fix regulator enable count imbalance after suspend/resume (git-fixes).\n- Input: elan_i2c - move regulator_[en|dis]able() out of elan_[en|dis]able_power() (git-fixes).\n- Input: gpio-keys - cancel delayed work only in case of GPIO (git-fixes).\n- Input: ili210x - fix reset timing (git-fixes).\n- Input: omap4-keypad - fix pm_runtime_get_sync() error checking (git-fixes).\n- Input: samsung-keypad - properly state IOMEM dependency (git-fixes).\n- Input: soc_button_array - also add Lenovo Yoga Tablet2 1051F to dmi_use_low_level_irq (git-fixes).\n- Input: sparcspkr - fix refcount leak in bbc_beep_probe (git-fixes).\n- Input: stmfts - do not leave device disabled in stmfts_input_open (git-fixes).\n- Input: stmfts - fix reference leak in stmfts_input_open (git-fixes).\n- Input: synaptics - enable InterTouch on ThinkPad T14/P14s Gen 1 AMD (git-fixes).\n- Input: synaptics: retry query upon error (bsc#1194086).\n- Input: wm97xx: Simplify resource management (git-fixes).\n- Input: zinitix - do not report shadow fingers (git-fixes).\n- integrity: check the return value of audit_log_start() (git-fixes).\n- iocost: do not reset the inuse weight of under-weighted debtors (git-fixes).\n- iocost: Fix divide-by-zero on donation from low hweight cgroup (bsc#1198014).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- iommu/amd: Fix loop timeout issue in iommu_ga_log_enable() (git-fixes).\n- iommu/amd: Increase timeout waiting for GA log enablement (bsc#1199052).\n- iommu/amd: Remove useless irq affinity notifier (git-fixes).\n- iommu/amd: Restore GA log/tail pointer on host resume (git-fixes).\n- iommu/amd: X2apic mode: mask/unmask interrupts on suspend/resume (git-fixes).\n- iommu/amd: X2apic mode: re-enable after resume (git-fixes).\n- iommu/amd: X2apic mode: setup the INTX registers on mask/unmask (git-fixes).\n- iommu: arm-smmu: disable large page mappings for Nvidia arm-smmu (bsc#1198826).\n- iommu/arm-smmu-qcom: Fix TTBR0 read (git-fixes).\n- iommu: Extend mutex lock scope in iommu_probe_device() (git-fixes).\n- iommu/ioasid: Introduce a helper to check for valid PASIDs (jsc#SLE-24350).\n- iommu/io-pgtable-arm: Fix table descriptor paddr formatting (git-fixes).\n- iommu/io-pgtable-arm-v7s: Add error handle for page table allocation failure (git-fixes).\n- iommu/iova: Fix race between FQ timeout and teardown (git-fixes).\n- iommu/sva: Assign a PASID to mm on PASID allocation and free it on mm exit (jsc#SLE-24350).\n- iommu/sva: Rename CONFIG_IOMMU_SVA_LIB to CONFIG_IOMMU_SVA (jsc#SLE-24350).\n- iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() (git-fixes).\n- ionic: add FW_STOPPING state (git-fixes).\n- ionic: Allow flexibility for error reporting on dev commands (git-fixes).\n- ionic: better handling of RESET event (git-fixes).\n- ionic: catch transition back to RUNNING with fw_generation 0 (git-fixes).\n- ionic: Cleanups in the Tx hotpath code (git-fixes).\n- ionic: Correctly print AQ errors if completions are not received (git-fixes).\n- ionic: disable napi when ionic_lif_init() fails (git-fixes).\n- ionic: Do not send reset commands if FW isn\u0027t running (git-fixes).\n- ionic: fix missing pci_release_regions() on error in ionic_probe() (git-fixes).\n- ionic: fix type complaint in ionic_dev_cmd_clean() (git-fixes).\n- ionic: fix up printing of timeout error (git-fixes).\n- ionic: Prevent filter add/del err msgs when the device is not available (git-fixes).\n- ionic: Query FW when getting VF info via ndo_get_vf_config (git-fixes).\n- ionic: remove the dbid_inuse bitmap (git-fixes).\n- ionic: replace set_vf data with union (git-fixes).\n- ionic: start watchdog after all is setup (git-fixes).\n- ionic: stretch heartbeat detection (git-fixes).\n- io_uring: add more locking annotations for submit (bsc#1199011).\n- io_uring: avoid touching inode in rw prep (bsc#1199011).\n- io_uring: be smarter about waking multiple CQ ring waiters (bsc#1199011).\n- io_uring: cache __io_free_req()\u0027d requests (bsc#1199011).\n- io_uring: clean io-wq callbacks (bsc#1199011).\n- io_uring: clean up tctx_task_work() (bsc#1199011).\n- io_uring: deduplicate open iopoll check (bsc#1199011).\n- io_uring: do not halt iopoll too early (bsc#1199011).\n- io_uring: drop exec checks from io_req_task_submit (bsc#1199011).\n- io_uring: extract a helper for ctx quiesce (bsc#1199011).\n- io_uring: Fix undefined-behaviour in io_issue_sqe (bsc#1199011).\n- io_uring: improve ctx hang handling (bsc#1199011).\n- io_uring: inline fixed part of io_file_get() (bsc#1199011).\n- io_uring: inline io_free_req_deferred (bsc#1199011).\n- io_uring: inline io_poll_remove_waitqs (bsc#1199011).\n- io_uring: inline struct io_comp_state (bsc#1199011).\n- io_uring: kill unused IO_IOPOLL_BATCH (bsc#1199011).\n- io_uring: move io_fallback_req_func() (bsc#1199011).\n- io_uring: move io_put_task() definition (bsc#1199011).\n- io_uring: move io_rsrc_node_alloc() definition (bsc#1199011).\n- io_uring: optimise io_cqring_wait() hot path (bsc#1199011).\n- io_uring: optimise putting task struct (bsc#1199011).\n- io_uring: refactor io_alloc_req (bsc#1199011).\n- io_uring: remove extra argument for overflow flush (bsc#1199011).\n- io_uring: remove file batch-get optimisation (bsc#1199011).\n- io_uring: remove IRQ aspect of io_ring_ctx completion lock (bsc#1199011).\n- io_uring: remove redundant args from cache_free (bsc#1199011).\n- io_uring: remove unnecessary PF_EXITING check (bsc#1199011).\n- io_uring: rename io_file_supports_async() (bsc#1199011).\n- io_uring: run linked timeouts from task_work (bsc#1199011).\n- io_uring: run regular file completions from task_work (bsc#1199011).\n- io_uring: run timeouts from task_work (bsc#1199011).\n- io_uring: use inflight_entry instead of compl.list (bsc#1199011).\n- io_uring: use kvmalloc for fixed files (bsc#1199011).\n- io-wq: get rid of FIXED worker flag (bsc#1199011).\n- io-wq: make worker creation resilient against signals (bsc#1199011).\n- io-wq: move nr_running and worker_refs out of wqe-\u003elock protection (bsc#1199011).\n- io-wq: only exit on fatal signals (bsc#1199011).\n- io-wq: provide a way to limit max number of workers (bsc#1199011).\n- io-wq: split bounded and unbounded work into separate lists (bsc#1199011).\n- io-wq: wqe and worker locks no longer need to be IRQ safe (bsc#1199011).\n- ipc/sem: do not sleep with a spin lock held (bsc#1198412).\n- ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback (git-fixes).\n- ipmi: bail out if init_srcu_struct fails (git-fixes).\n- ipmi: Fix pr_fmt to avoid compilation issues (git-fixes).\n- ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module (git-fixes).\n- ipmi:ssif: Check for NULL msg when handling events and messages (git-fixes).\n- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).\n- ipw2x00: Fix potential NULL dereference in libipw_xmit() (git-fixes).\n- irqchip/armada-370-xp: Do not touch Performance Counter Overflow on A375, A38x, A39x (git-fixes).\n- irqchip/aspeed-i2c-ic: Fix irq_of_parse_and_map() return value (git-fixes).\n- irqchip/aspeed-scu-ic: Fix irq_of_parse_and_map() return value (git-fixes).\n- irqchip/exiu: Fix acknowledgment of edge triggered interrupts (git-fixes).\n- irqchip/gic, gic-v3: Prevent GSI to SGI translations (git-fixes).\n- irqchip/gic/realview: Fix refcount leak in realview_gic_of_init (git-fixes).\n- irqchip/gic-v3: Ensure pseudo-NMIs have an ISB between ack and handling (git-fixes).\n- irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions (git-fixes).\n- irqchip/gic-v3: Fix GICR_CTLR.RWP polling (git-fixes).\n- irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions (git-fixes).\n- irqchip/gic-v4: Wait for GICR_VPENDBASER.Dirty to clear before descheduling (git-fixes).\n- irqchip: irq-xtensa-mx: fix initial IRQ affinity (git-fixes).\n- irqchip/nvic: Release nvic_base upon failure (git-fixes).\n- irqchip/qcom-pdc: Fix broken locking (git-fixes).\n- irqchip/realtek-rtl: Fix refcount leak in map_interrupts (git-fixes).\n- irqchip/realtek-rtl: Service all pending interrupts (git-fixes).\n- isdn: hfcpci: check the return value of dma_set_mask() in setup_hw() (git-fixes).\n- ivtv: fix incorrect device_caps for ivtvfb (git-fixes).\n- iwlwifi: do not advertise TWT support (git-fixes).\n- iwlwifi: Fix -EIO error code that is never returned (git-fixes).\n- iwlwifi: fix use-after-free (git-fixes).\n- iwlwifi: iwl-dbg: Use del_timer_sync() before freeing (git-fixes).\n- iwlwifi: mvm: align locking in D3 test debugfs (git-fixes).\n- iwlwifi: mvm: check debugfs_dir ptr before use (git-fixes).\n- iwlwifi: mvm: Correctly set fragmented EBS (git-fixes).\n- iwlwifi: mvm: Do not call iwl_mvm_sta_from_mac80211() with NULL sta (git-fixes).\n- iwlwifi: mvm: do not crash on invalid rate w/o STA (git-fixes).\n- iwlwifi: mvm: do not iterate unadded vifs when handling FW SMPS req (git-fixes).\n- iwlwifi: mvm: do not send SAR GEO command for 3160 devices (git-fixes).\n- iwlwifi: mvm: Fix an error code in iwl_mvm_up() (git-fixes).\n- iwlwifi: mvm: fix assert 1F04 upon reconfig (git-fixes).\n- iwlwifi: mvm: move only to an enabled channel (git-fixes).\n- iwlwifi: pcie: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: pcie: gen2: fix locking when \u0027HW not ready\u0027 (git-fixes).\n- iwlwifi: yoyo: remove DBGI_SRAM address reset writing (git-fixes).\n- ixgbe: do not reserve excessive XDP_PACKET_HEADROOM on XSK Rx to skb (git-fixes).\n- ixgbe: ensure IPsec VF - PF compatibility (git-fixes).\n- ixgbe: respect metadata on XSK Rx to skb (git-fixes).\n- ixgbe: xsk: change !netif_carrier_ok() handling in ixgbe_xmit_zc() (git-fixes).\n- jbd2: Fake symbols defined under CONFIG_JBD2_DEBUG (bsc#1198971).\n- jfs: fix divide error in dbNextAG (bsc#1200828).\n- kABI: fix change of iscsi_host_remove() arguments (bsc#1198410).\n- kABI: Fix kABI after \u0027x86/mm/cpa: Generalize __set_memory_enc_pgtable()\u0027 (jsc#SLE-19924).\n- kABI fix of sysctl_run_estimation (git-fixes).\n- kABI: fix removal of iscsi_destroy_conn (bsc#1198410).\n- kABI: fix rndis_parameters locking (git-fixes).\n- kABI: ivtv: restore caps member (git-fixes).\n- kabi/severities: add exception for bcache symboles\n- kabi/severities: allow dropping a few invalid exported symbols (bsc#1201218)\n- kabi/severities: Ignore arch/x86/kvm except for kvm_x86_ops Handle this like in previous SLE kernels.\n- kABI workaround for fxls8962af iio accel drivers (git-fixes).\n- kABI workaround for pci quirks (git-fixes).\n- kconfig: fix failing to generate auto.conf (git-fixes).\n- kconfig: let \u0027shell\u0027 return enough output for deep path names (git-fixes).\n- kernel/fork: Initialize mm\u0027s PASID (jsc#SLE-24350).\n- kernel/resource: Introduce request_mem_region_muxed() (git-fixes).\n- kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add] (git-fixes).\n- KEYS: asymmetric: enforce that sig algo matches key algo (git-fixes).\n- KEYS: asymmetric: properly validate hash_algo and encoding (git-fixes).\n- KEYS: fix length validation in keyctl_pkey_params_get_2() (git-fixes).\n- KEYS: trusted: Avoid calling null function trusted_key_exit (git-fixes).\n- KEYS: trusted: Fix trusted key backends when building as module (git-fixes).\n- KEYS: trusted: tpm2: Fix migratable logic (git-fixes).\n- kprobes: Add kretprobe_find_ret_addr() for searching return address (bsc#1193277).\n- kprobes: Enable stacktrace from pt_regs in kretprobe handler (bsc#1193277).\n- kprobes: treewide: Cleanup the error messages for kprobes (bsc#1193277).\n- kprobes: treewide: Make it harder to refer kretprobe_trampoline directly (bsc#1193277).\n- kprobes: treewide: Remove trampoline_address from kretprobe_trampoline_handler() (bsc#1193277).\n- kprobes: treewide: Replace arch_deref_entry_point() with dereference_symbol_descriptor() (bsc#1193277).\n- kprobes: treewide: Use \u0027kprobe_opcode_t *\u0027 for the code address in get_optimized_kprobe() (bsc#1193277).\n- kselftest/arm64: bti: force static linking (git-fixes).\n- kunit: tool: Import missing importlib.abc (git-fixes).\n- KVM: arm64: Avoid consuming a stale esr value when SError occur (git-fixes).\n- KVM: arm64: Drop unused workaround_flags vcpu field (git-fixes).\n- KVM: arm64: pkvm: Use the mm_ops indirection for cache maintenance (git-fixes).\n- KVM: arm64: Use shadow SPSR_EL1 when injecting exceptions on !VHE (git-fixes).\n- KVM: Clean up benign vcpu-\u003ecpu data races when kicking vCPUs (git-fixes).\n- KVM: Ensure local memslot copies operate on up-to-date arch-specific data (git-fixes).\n- KVM: fix wrong exception emulation in check_rdtsc (git-fixes).\n- KVM: LAPIC: Drop pending LAPIC timer injection when canceling the timer (git-fixes).\n- KVM: nVMX: Abide to KVM_REQ_TLB_FLUSH_GUEST request on nested vmentry/vmexit (git-fixes).\n- KVM: nVMX: Clear IDT vectoring on nested VM-Exit for double/triple fault (git-fixes).\n- KVM: nVMX: Do not clear CR3 load/store exiting bits if L1 wants \u0027em (git-fixes).\n- KVM: nVMX: Emulate guest TLB flush on nested VM-Enter with new vpid12 (git-fixes).\n- KVM: nVMX: Ensure vCPU honors event request if posting nested IRQ fails (git-fixes).\n- KVM: nVMX: Flush current VPID (L1 vs. L2) for KVM_REQ_TLB_FLUSH_GUEST (git-fixes).\n- KVM: nVMX: Leave most VM-Exit info fields unmodified on failed VM-Entry (git-fixes).\n- KVM: PPC: Fix TCE handling for VFIO (bsc#1061840 git-fixes).\n- KVM: s390: Ensure kvm_arch_no_poll() is read once when blocking vCPU (git-fixes).\n- KVM: s390: pv: add macros for UVC CC values (git-fixes).\n- KVM: s390: pv: avoid stalls when making pages secure (git-fixes).\n- KVM: s390: vsie/gmap: reduce gmap_rmap overhead (git-fixes).\n- KVM: selftests: Do not skip L2\u0027s VMCALL in SMM test for SVM guest (bsc#1194523).\n- KVM: selftests: Re-enable access_tracking_perf_test (bsc#1194526).\n- KVM: SEV: accept signals in sev_lock_two_vms (bsc#1194526).\n- KVM: SEV: do not take kvm-\u003elock when destroying (bsc#1194526).\n- KVM: SEV: Fall back to vmalloc for SEV-ES scratch area if necessary (bsc#1194526).\n- KVM: SEV: Mark nested locking of kvm-\u003elock (bsc#1194526).\n- KVM: SEV: Return appropriate error codes if SEV-ES scratch setup fails (bsc#1194526).\n- KVM: SVM: Allow AVIC support on system w/ physical APIC ID \u003e 255 (bsc#1193823).\n- KVM: SVM: Do not terminate SEV-ES guests on GHCB validation failure (bsc#1194526).\n- KVM: SVM: drop unnecessary code in svm_hv_vmcb_dirty_nested_enlightenments() (git-fixes).\n- KVM: SVM: Emulate #INIT in response to triple fault shutdown (git-fixes).\n- KVM: SVM: Fix kvm_cache_regs.h inclusions for is_guest_mode() (git-fixes).\n- KVM: SVM: hyper-v: Enable Enlightened MSR-Bitmap support for real (git-fixes).\n- KVM: SVM: Never reject emulation due to SMAP errata for !SEV guests (git-fixes).\n- KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak (git-fixes).\n- KVM: VMX: Do not unblock vCPU w/ Posted IRQ if IRQs are disabled in guest (git-fixes).\n- KVM: VMX: Fold ept_update_paging_mode_cr0() back into vmx_set_cr0() (git-fixes).\n- KVM: VMX: Invert handling of CR0.WP for EPT without unrestricted guest (git-fixes).\n- KVM: VMX: Read Posted Interrupt \u0027control\u0027 exactly once per loop iteration (git-fixes).\n- KVM: VMX: Refresh list of user return MSRs after setting guest CPUID (git-fixes).\n- KVM: VMX: Remove defunct \u0027nr_active_uret_msrs\u0027 field (git-fixes).\n- KVM: VMX: Set failure code in prepare_vmcs02() (git-fixes).\n- KVM: VMX: Skip pointless MSR bitmap update when setting EFER (git-fixes).\n- KVM: VMX: Wake vCPU when delivering posted IRQ even if vCPU == this vCPU (git-fixes).\n- KVM: x86: Assume a 64-bit hypercall for guests with protected state (git-fixes).\n- kvm: x86/cpuid: Only provide CPUID leaf 0xA if host has architectural PMU (git-fixes).\n- KVM: x86: Do not force set BSP bit when local APIC is managed by userspace (git-fixes).\n- KVM: x86: Do not mark all registers as avail/dirty during RESET/INIT (git-fixes).\n- KVM: x86: do not print when fail to read/write pv eoi memory (git-fixes).\n- KVM: x86: Drop guest CPUID check for host initiated writes to MSR_IA32_PERF_CAPABILITIES (git-fixes).\n- KVM: x86: Drop WARNs that assert a triple fault never \u0027escapes\u0027 from L2 (git-fixes).\n- KVM: x86/emulator: Defer not-present segment check in __load_segment_descriptor() (git-fixes).\n- KVM: X86: Ensure that dirty PDPTRs are loaded (git-fixes).\n- KVM: x86: Exit to userspace if emulation prepared a completion callback (git-fixes).\n- KVM: x86: Fix emulation in writing cr8 (git-fixes).\n- KVM: X86: Fix missed remote tlb flush in rmap_write_protect() (git-fixes).\n- KVM: x86: Fix uninitialized eoi_exit_bitmap usage in vcpu_load_eoi_exitmap() (git-fixes).\n- KVM: x86: Handle 32-bit wrap of EIP for EMULTYPE_SKIP with flat code seg (git-fixes).\n- KVM: x86: hyper-v: Fix the maximum number of sparse banks for XMM fast TLB flush hypercalls (git-fixes).\n- KVM: x86: Ignore sparse banks size for an \u0027all CPUs\u0027, non-sparse IPI req (git-fixes).\n- KVM: x86: Mark all registers as avail/dirty at vCPU creation (git-fixes).\n- KVM: x86: Migrate the PIT only if vcpu0 is migrated, not any BSP (git-fixes).\n- KVM: x86/mmu: Check for present SPTE when clearing dirty bit in TDP MMU (git-fixes).\n- KVM: x86/mmu: Complete prefetch for trailing SPTEs for direct, legacy MMU (git-fixes).\n- KVM: x86/mmu: Fix TLB flush range when handling disconnected pt (git-fixes).\n- KVM: x86/mmu: Fix write-protection of PTs mapped by the TDP MMU (git-fixes).\n- KVM: x86/mmu: Passing up the error state of mmu_alloc_shadow_roots() (git-fixes).\n- KVM: x86/mmu: Pass parameter flush as false in kvm_tdp_mmu_zap_collapsible_sptes() (git-fixes).\n- KVM: x86/mmu: Remove spurious TLB flushes in TDP MMU zap collapsible path (git-fixes).\n- KVM: x86/mmu: Skip tlb flush if it has been done in zap_gfn_range() (git-fixes).\n- KVM: x86/mmu: Update number of zapped pages even if page list is stable (git-fixes).\n- KVM: x86/mmu: Use yield-safe TDP MMU root iter in MMU notifier unmapping (git-fixes).\n- KVM: x86: nSVM: restore the L1 host state prior to resuming nested guest on SMM exit (git-fixes).\n- KVM: x86: nSVM: skip eax alignment check for non-SVM instructions (git-fixes).\n- KVM: x86: nSVM: test eax for 4K alignment for GP errata workaround (git-fixes).\n- KVM: x86: Pend KVM_REQ_APICV_UPDATE during vCPU creation to fix a race (git-fixes).\n- KVM: x86/pmu: Fix reserved bits for AMD PerfEvtSeln register (git-fixes).\n- KVM: x86/pmu: Use AMD64_RAW_EVENT_MASK for PERF_TYPE_RAW (git-fixes).\n- KVM: x86: Register Processor Trace interrupt hook iff PT enabled in guest (git-fixes).\n- KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs (git-fixes).\n- KVM: x86: SVM: do not set VMLOAD/VMSAVE intercepts on vCPU reset (git-fixes).\n- KVM: x86: SVM: fix avic spec based definitions again (bsc#1193823 jsc#SLE-24549).\n- KVM: x86: SVM: move avic definitions from AMD\u0027s spec to svm.h (bsc#1193823 jsc#SLE-24549).\n- KVM: X86: Synchronize the shadow pagetable before link it (git-fixes).\n- KVM: x86: Update vCPU\u0027s runtime CPUID on write to MSR_IA32_XSS (git-fixes).\n- KVM: x86: Wait for IPIs to be delivered when handling Hyper-V TLB flush hypercall (git-fixes).\n- lib: bitmap: fix many kernel-doc warnings (git-fixes).\n- libbpf: Free up resources used by inner map definition (git-fixes).\n- lib/iov_iter: initialize \u0027flags\u0027 in new pipe_buffer (git-fixes).\n- libsubcmd: Fix use-after-free for realloc(..., 0) (git-fixes).\n- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).\n- list: fix a data-race around ep-\u003erdllist (git-fixes).\n- list: introduce list_is_head() helper and re-use it in list.h (git-fixes).\n- list: test: Add a test for list_is_head() (git-fixes).\n- livepatch: Do not block removal of patches that are safe to unload (bsc#1071995).\n- locking: Make owner_on_cpu() into linux/sched.h (bsc#1190137 bsc#1189998).\n- locking: Remove rt_rwlock_is_contended() (bsc#1190137 bsc#1189998).\n- locking/rtmutex: Add rt_mutex_lock_nest_lock() and rt_mutex_lock_killable() (bsc#1190137 bsc#1189998).\n- locking/rtmutex: Squash self-deadlock check for ww_rt_mutex (bsc#1190137 bsc#1189998).\n- locking/rwlocks: introduce write_lock_nested (bsc#1189998).\n- LSM: general protection fault in legacy_parse_param (git-fixes).\n- lz4: fix LZ4_decompress_safe_partial read out of bound (git-fixes).\n- mac80211: fix EAPoL rekey fail in 802.3 rx path (git-fixes).\n- mac80211: fix forwarded mesh frames AC and queue selection (git-fixes).\n- mac80211: fix potential double free on mesh join (git-fixes).\n- mac80211: fix rx reordering with non explicit / psmp ack policy (git-fixes).\n- mac80211_hwsim: call ieee80211_tx_prepare_skb under RCU protection (git-fixes).\n- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work (git-fixes).\n- mac80211_hwsim: report NOACK frames in tx_status (git-fixes).\n- mac80211: minstrel_ht: fix where rate stats are stored (fixes debugfs output) (git-fixes).\n- mac80211: mlme: check for null after calling kmemdup (git-fixes).\n- mac80211: refuse aggregations sessions before authorized (git-fixes).\n- mac80211: Remove a couple of obsolete TODO (git-fixes).\n- mac80211: Reset MBSSID parameters upon connection (git-fixes).\n- mac80211: treat some SAE auth steps as final (git-fixes).\n- mac80211: upgrade passive scan to active scan on DFS channels after beacon rx (git-fixes).\n- macvlan: Fix leaking skb in source mode with nodst option (git-fixes).\n- mailbox: change mailbox-mpfs compatible string (git-fixes).\n- mailbox: imx: fix crash in resume on i.mx8ulp (git-fixes).\n- mailbox: imx: fix wakeup failure from freeze mode (git-fixes).\n- mailbox: tegra-hsp: Flush whole channel (git-fixes).\n- maple: fix wrong return value of maple_bus_init() (git-fixes).\n- md: Do not set mddev private to NULL in raid0 pers-\u003efree (git-fixes).\n- md: fix an incorrect NULL check in does_sb_need_changing (git-fixes).\n- md: fix an incorrect NULL check in md_reload_sb (git-fixes).\n- md: fix double free of io_acct_set bioset (git-fixes).\n- md: fix update super 1.0 on rdev size change (git-fixes).\n- md: Move alloc/free acct bioset in to personality (git-fixes).\n- md/raid5: play nice with PREEMPT_RT (bsc#1189998).\n- media: aspeed: Correct value for h-total-pixels (git-fixes).\n- media: atmel: atmel-isc-base: report frame sizes as full supported range (git-fixes).\n- media: atmel: atmel-isc: Fix PM disable depth imbalance in atmel_isc_probe (git-fixes).\n- media: atmel: atmel-sama5d2-isc: fix wrong mask in YUYV format check (git-fixes).\n- media: atmel: atmel-sama7g5-isc: fix ispck leftover (git-fixes).\n- media: atomisp: fix bad usage at error handling logic (git-fixes).\n- media: atomisp: fix dummy_ptr check to avoid duplicate active_bo (git-fixes).\n- media: atomisp_gmin_platform: Add DMI quirk to not turn AXP ELDO2 regulator off on some boards (git-fixes).\n- media: bttv: fix WARNING regression on tunerless devices (git-fixes).\n- media: camss: csid-170: do not enable unused irqs (git-fixes).\n- media: camss: csid-170: fix non-10bit formats (git-fixes).\n- media: camss: csid-170: remove stray comment (git-fixes).\n- media: camss: csid-170: set the right HALT_CMD when disabled (git-fixes).\n- media: camss: vfe-170: fix \u0027VFE halt timeout\u0027 error (git-fixes).\n- media: ccs-core.c: fix failure to call clk_disable_unprepare (git-fixes).\n- media: cec-adap.c: fix is_configuring state (git-fixes).\n- media: cedrus: h264: Fix neighbour info buffer size (git-fixes).\n- media: cedrus: H265: Fix neighbour info buffer size (git-fixes).\n- media: coda: Fix missing put_device() call in coda_get_vdoa_data (git-fixes).\n- media: cx25821: Fix the warning when removing the module (git-fixes).\n- media: cx88-mpeg: clear interrupt status register before streaming video (git-fixes).\n- media: davinci: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).\n- media: davinci: vpif: fix unbalanced runtime PM enable (git-fixes).\n- media: davinci: vpif: fix unbalanced runtime PM get (git-fixes).\n- media: davinci: vpif: fix use-after-free on driver unbind (git-fixes).\n- media: doc: pixfmt-rgb: Fix V4L2_PIX_FMT_BGR24 format description (git-fixes).\n- media: doc: pixfmt-yuv: Fix V4L2-PIX-FMT-Y10P format (git-fixes).\n- media: em28xx: initialize refcount before kref_get (git-fixes).\n- media: gpio-ir-tx: fix transmit with long spaces on Orange Pi PC (git-fixes).\n- media: hantro: Empty encoder capture buffers by default (git-fixes).\n- media: hantro: Fix overfill bottom register field name (git-fixes).\n- media: hantro: HEVC: Fix tile info buffer value computation (git-fixes).\n- media: hantro: HEVC: unconditionnaly set pps_{cb/cr}_qp_offset values (git-fixes).\n- media: hdpvr: initialize dev-\u003eworker at hdpvr_register_videodev (git-fixes).\n- media: i2c: max9286: fix kernel oops when removing module (git-fixes).\n- media: i2c: max9286: Use dev_err_probe() helper (git-fixes).\n- media: i2c: max9286: Use \u0027maxim,gpio-poc\u0027 property (git-fixes).\n- media: i2c: ov5648: Fix lockdep error (git-fixes).\n- media: i2c: ov5648: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).\n- media: i2c: rdacm2x: properly set subdev entity function (git-fixes).\n- media: imon: reorganize serialization (git-fixes).\n- media: imx-jpeg: fix a bug of accessing array out of bounds (git-fixes).\n- media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers (git-fixes).\n- media: iommu/mediatek: Add device_link between the consumer and the larb devices (git-fixes).\n- media: iommu/mediatek: Return ENODEV if the device is NULL (git-fixes).\n- media: iommu/mediatek-v1: Free the existed fwspec if the master dev already has (git-fixes).\n- media: ir_toy: free before error exiting (git-fixes).\n- media: media-entity.h: Fix documentation for media_create_intf_link (git-fixes).\n- media: mexon-ge2d: fixup frames size in registers (git-fixes).\n- media: mtk-vcodec: potential dereference of null pointer (git-fixes).\n- media: omap3isp: Use struct_group() for memcpy() region (git-fixes).\n- media: ov5640: Fix set format, v4l2_mbus_pixelcode not updated (git-fixes).\n- media: ov5648: Do not pack controls struct (git-fixes).\n- media: ov6650: Add try support to selection API operations (git-fixes).\n- media: ov6650: Fix crop rectangle affected by set format (git-fixes).\n- media: ov6650: Fix set format try processing path (git-fixes).\n- media: ov7670: remove ov7670_power_off from ov7670_remove (git-fixes).\n- media: pci: cx23885: Fix the error handling in cx23885_initdev() (git-fixes).\n- media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init (git-fixes).\n- media: Revert \u0027media: em28xx: add missing em28xx_close_extension\u0027 (git-fixes).\n- media: rga: fix possible memory leak in rga_probe (git-fixes).\n- media: rkvdec: h264: Fix bit depth wrap in pps packet (git-fixes).\n- media: rkvdec: h264: Fix dpb_valid implementation (git-fixes).\n- media: rkvdec: Stop overclocking the decoder (git-fixes).\n- media: rockchip/rga: do proper error checking in probe (git-fixes).\n- media: saa7134: fix incorrect use to determine if list is empty (git-fixes).\n- media: staging: media: imx: imx7-mipi-csis: Make subdev name unique (git-fixes).\n- media: staging: media: rkvdec: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).\n- media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com (git-fixes).\n- media: staging: media: zoran: fix usage of vb2_dma_contig_set_max_seg_size (git-fixes).\n- media: staging: media: zoran: fix various V4L2 compliance errors (git-fixes).\n- media: staging: media: zoran: move videodev alloc (git-fixes).\n- media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED (git-fixes).\n- media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() (git-fixes).\n- media: usb: go7007: s2250-board: fix leak in probe() (git-fixes).\n- media: uvcvideo: Fix missing check to determine if element is found in list (git-fixes).\n- media: v4l2-core: Initialize h264 scaling matrix (git-fixes).\n- media: v4l2-mem2mem: Apply DST_QUEUE_OFF_BASE on MMAP buffers across ioctls (git-fixes).\n- media: v4l: Avoid unaligned access warnings when printing 4cc modifiers (git-fixes).\n- media: venus: hfi: avoid null dereference in deinit (git-fixes).\n- media: venus: hfi_cmds: List HDR10 property as unsupported for v1 and v3 (git-fixes).\n- media: videobuf2: Fix the size printk format (git-fixes).\n- media: video/hdmi: handle short reads of hdmi info frame (git-fixes).\n- media: vidtv: Check for null return of vzalloc (git-fixes).\n- mei: avoid iterator usage outside of list_for_each_entry (git-fixes).\n- mei: hbm: drop capability response on early shutdown (git-fixes).\n- mei: me: add Alder Lake N device id (git-fixes).\n- mei: me: add raptor lake point S DID (git-fixes).\n- mei: me: disable driver on the ign firmware (git-fixes).\n- memblock: fix memblock_phys_alloc() section mismatch error (git-fixes).\n- memory: atmel-ebi: Fix missing of_node_put in atmel_ebi_probe (git-fixes).\n- memory: emif: Add check for setup_interrupts (git-fixes).\n- memory: emif: check the pointer temp in get_device_details() (git-fixes).\n- memory: fsl_ifc: populate child nodes of buses and mfd devices (git-fixes).\n- memory: mtk-smi: Add error handle for smi_probe (git-fixes).\n- memory: renesas-rpc-if: Fix HF/OSPI data transfer in Manual Mode (git-fixes).\n- memory: renesas-rpc-if: fix platform-device leak in error path (git-fixes).\n- memory: samsung: exynos5422-dmc: Avoid some over memory allocation (git-fixes).\n- memory: samsung: exynos5422-dmc: Fix refcount leak in of_get_dram_timings (git-fixes).\n- mfd: asic3: Add missing iounmap() on error asic3_mfd_probe (git-fixes).\n- mfd: davinci_voicecodec: Fix possible null-ptr-deref davinci_vc_probe() (git-fixes).\n- mfd: exynos-lpass: Drop unneeded syscon.h include (git-fixes).\n- mfd: ipaq-micro: Fix error check return value of platform_get_irq() (git-fixes).\n- mfd: mc13xxx: Add check for mc13xxx_irq_request (git-fixes).\n- mgag200 fix memmapsl configuration in GCTL6 register (git-fixes).\n- misc: alcor_pci: Fix an error handling path (git-fixes).\n- misc: atmel-ssc: Fix IRQ check in ssc_probe (git-fixes).\n- misc: fastrpc: avoid double fput() on failed usercopy (git-fixes).\n- misc: fastrpc: fix an incorrect NULL check on list iterator (git-fixes).\n- misc: ocxl: fix possible double free in ocxl_file_register_afu (git-fixes).\n- misc: rtsx: set NULL intfdata when probe fails (git-fixes).\n- misc: sgi-gru: Do not cast parameter in bit operations (git-fixes).\n- mISDN: Fix memory leak in dsp_pipeline_build() (git-fixes).\n- mlx5: kabi protect lag_mp (git-fixes).\n- mlxsw: spectrum: Protect driver from buggy firmware (git-fixes).\n- mm: Add fault_in_subpage_writeable() to probe at sub-page granularity (git-fixes)\n- mmc: block: Check for errors after write on SPI (git-fixes).\n- mmc: block: Fix CQE recovery reset success (git-fixes).\n- mmc: block: fix read single on recovery logic (git-fixes).\n- mmc: core: Allows to override the timeout value for ioctl() path (git-fixes).\n- mmc: core: Fixup support for writeback-cache for eMMC and SD (git-fixes).\n- mmc: core: Set HS clock speed before sending HS CMD13 (git-fixes).\n- mmc: core: Wait for command setting \u0027Power Off Notification\u0027 bit to complete (git-fixes).\n- mmc: davinci_mmc: Handle error for clk_enable (git-fixes).\n- mm: Change CONFIG option for mm-\u003epasid field (jsc#SLE-24350).\n- mmc: host: Return an error when -\u003eenable_sdio_irq() ops is missing (git-fixes).\n- mmc: jz4740: Apply DMA engine limits to maximum segment size (git-fixes).\n- mm/cma: provide option to opt out from exposing pages on activation failure (bsc#1195099 ltc#196102).\n- mmc: mediatek: wait dma stop bit reset to 0 (git-fixes).\n- mmc: meson: Fix usage of meson_mmc_post_req() (git-fixes).\n- mmc: mmci: stm32: correctly check all elements of sg list (git-fixes).\n- mmc: renesas_sdhi: do not overwrite TAP settings when HS400 tuning is complete (git-fixes).\n- mmc: rtsx: add 74 Clocks in power on flow (git-fixes).\n- mmc: rtsx: Fix build errors/warnings for unused variable (git-fixes).\n- mmc: rtsx: Let MMC core handle runtime PM (git-fixes).\n- mmc: rtsx: Use pm_runtime_{get,put}() to handle runtime PM (git-fixes).\n- mmc: sdhci_am654: Fix the driver data of AM64 SoC (git-fixes).\n- mmc: sdhci-msm: Reset GCC_SDCC_BCR register for SDHC (git-fixes).\n- mmc: sdhci-of-esdhc: Check for error num after setting mask (git-fixes).\n- mmc: sdhci-pci-o2micro: Fix card detect by dealing with debouncing (git-fixes).\n- mmc: sunxi-mmc: Fix DMA descriptors allocated above 32 bits (git-fixes).\n- mm: fs: fix lru_cache_disabled race in bh_lru (bsc#1197761).\n- mm: Fully initialize invalidate_lock, amend lock class later (bsc#1197921).\n- mm: memcg: synchronize objcg lists with a dedicated spinlock (bsc#1198402).\n- mm/page_alloc: always attempt to allocate at least one page during bulk allocation (git fixes (mm/pgalloc)).\n- mm/page_alloc.c: do not warn allocation failure on zone DMA if no managed pages (bsc#1197501).\n- mm, page_alloc: fix build_zonerefs_node() (git-fixes).\n- mm/scatterlist: replace the !preemptible warning in sg_miter_stop() (bsc#1189998).\n- mm/slub: add missing TID updates on slab deactivation (git-fixes).\n- mm, thp: fix incorrect unmap behavior for private pages (bsc#1198024).\n- mm, thp: lock filemap when truncating page cache (bsc#1198023).\n- mm/vmalloc: fix comments about vmap_area struct (git-fixes).\n- mm_zone: add function to check if managed dma zone exists (bsc#1197501).\n- modpost: fix removing numeric suffixes (git-fixes).\n- modpost: fix section mismatch check for exported init/exit sections (git-fixes).\n- modpost: fix undefined behavior of is_arm_mapping_symbol() (git-fixes).\n- modpost: restore the warning message for missing symbol versions (git-fixes).\n- mptcp: add missing documented NL params (git-fixes).\n- mt76: connac: fix sta_rec_wtbl tag len (git-fixes).\n- mt76: dma: initialize skip_unmap in mt76_dma_rx_fill (git-fixes).\n- mt76: do not attempt to reorder received 802.3 packets without agg session (git-fixes).\n- mt76: fix encap offload ethernet type check (git-fixes).\n- mt76: fix monitor mode crash with sdio driver (git-fixes).\n- mt76: Fix undefined behavior due to shift overflowing the constant (git-fixes).\n- mt76: mt7603: check sta_rates pointer in mt7603_sta_rate_tbl_update (git-fixes).\n- mt76: mt7615: check sta_rates pointer in mt7615_sta_rate_tbl_update (git-fixes).\n- mt76: mt7615: fix a leftover race in runtime-pm (git-fixes).\n- mt76: mt7615: Fix assigning negative values to unsigned variable (git-fixes).\n- mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU (git-fixes).\n- mt76: mt7915: use proper aid value in mt7915_mcu_sta_basic_tlv (git-fixes).\n- mt76: mt7915: use proper aid value in mt7915_mcu_wtbl_generic_tlv in sta mode (git-fixes).\n- mt76: mt7921: accept rx frames with non-standard VHT MCS10-11 (git-fixes).\n- mt76: mt7921e: fix possible probe failure after reboot (bsc#1198835).\n- mt76: mt7921: fix a leftover race in runtime-pm (git-fixes).\n- mt76: mt7921: fix crash when startup fails (git-fixes).\n- mt76: mt7921: fix mt7921_queues_acq implementation (git-fixes).\n- mt76: mt7921: Fix the error handling path of mt7921_pci_probe() (git-fixes).\n- mtd: cfi_cmdset_0002: Move and rename chip_check/chip_ready/chip_good_for_write (git-fixes).\n- mtd: mchp23k256: Add SPI ID table (git-fixes).\n- mtd: mchp48l640: Add SPI ID table (git-fixes).\n- mtd: onenand: Check for error irq (git-fixes).\n- mtd: parsers: qcom: Fix kernel panic on skipped partition (git-fixes).\n- mtd: parsers: qcom: Fix missing free for pparts in cleanup (git-fixes).\n- mtd: phram: Prevent divide by zero bug in phram_setup() (git-fixes).\n- mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init (git-fixes).\n- mtd: rawnand: brcmnand: Fixed incorrect sub-page ECC status (git-fixes).\n- mtd: rawnand: cadence: fix possible null-ptr-deref in cadence_nand_dt_probe() (git-fixes).\n- mtd: rawnand: denali: Use managed device resources (git-fixes).\n- mtd: rawnand: fix ecc parameters for mt7622 (git-fixes).\n- mtd: rawnand: Fix return value check of wait_for_completion_timeout (git-fixes).\n- mtd: rawnand: gpmi: do not leak PM reference in error path (git-fixes).\n- mtd: rawnand: gpmi: fix controller timings setting (git-fixes).\n- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).\n- mtd: rawnand: ingenic: Fix missing put_device in ingenic_ecc_get (git-fixes).\n- mtd: rawnand: intel: fix possible null-ptr-deref in ebu_nand_probe() (git-fixes).\n- mtd: rawnand: pl353: Set the nand chip node as the flash node (git-fixes).\n- mtd: rawnand: qcom: Fix clock sequencing in qcom_nandc_probe() (git-fixes).\n- mtd: rawnand: qcom: fix memory corruption that causes panic (git-fixes).\n- mtd: spinand: gigadevice: fix Quad IO for GD5F1GQ5UExxG (git-fixes).\n- mtd: spi-nor: core: Check written SR value in spi_nor_write_16bit_sr_and_check() (git-fixes).\n- mwifiex: add mutex lock for call in mwifiex_dfs_chan_sw_work_queue (git-fixes).\n- n64cart: convert bi_disk to bi_bdev-\u003ebd_disk fix build (git-fixes).\n- natsemi: sonic: stop calling netdev_boot_setup_check (git-fixes).\n- net: asix: add proper error handling of usb read errors (git-fixes).\n- net: atlantic: Avoid out-of-bounds indexing (git-fixes).\n- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).\n- net: axienet: setup mdio unconditionally (git-fixes).\n- net: bnxt_ptp: fix compilation error (bsc#1199736).\n- net: dev: Always serialize on Qdisc::busylock in __dev_xmit_skb() on PREEMPT_RT (bsc#1189998).\n- net: dev: Change the order of the arguments for the contended condition (bsc#1189998).\n- net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove (git-fixes).\n- net: dpaa_eth: remove dead select in menuconfig FSL_DPAA_ETH (git-fixes).\n- net: dsa: be compatible with masters which unregister on shutdown (git-fixes).\n- net: dsa: hellcreek: be compatible with masters which unregister on shutdown (git-fixes).\n- net: dsa: microchip: ksz8863: be compatible with masters which unregister on shutdown (git-fixes).\n- net: dsa: xrs700x: be compatible with masters which unregister on shutdown (git-fixes).\n- net: ethernet: lantiq_etop: fix build errors/warnings (git-fixes).\n- net: ethernet: mediatek: add missing of_node_put() in mtk_sgmii_init() (git-fixes).\n- net: ethernet: mtk_eth_soc: fix misuse of mem alloc interface netdev[napi]_alloc_frag (git-fixes).\n- net: ethernet: mtk_eth_soc: out of bounds read in mtk_hwlro_get_fdir_entry() (git-fixes).\n- net: ethernet: ti: am65-cpsw-nuss: Fix some refcount leaks (git-fixes).\n- netfilter: conntrack: move synack init code to helper (bsc#1199035).\n- netfilter: conntrack: re-init state for retransmitted syn-ack (bsc#1199035).\n- netfilter: nf_conntrack_tcp: preserve liberal flag in tcp options (bsc#1199035).\n- netfilter: nf_conntrack_tcp: re-init for syn packets only (bsc#1199035).\n- net: handle ARPHRD_PIMREG in dev_is_mac_header_xmit() (git-fixes).\n- net: hns3: add NULL pointer check for hns3_set/get_ringparam() (git-fixes).\n- net: hns3: add return value for mailbox handling in PF (bsc#1190336).\n- net: hns3: add validity check for message data length (git-fixes).\n- net: hns3: add vlan list lock to protect vlan list (git-fixes).\n- net: hns3: align the debugfs output to the left (git-fixes).\n- net: hns3: clear inited state and stop client after failed to register netdev (git-fixes).\n- net: hns3: fix bug when PF set the duplicate MAC address for VFs (git-fixes).\n- net: hns3: fix phy can not link up when autoneg off and reset (git-fixes).\n- net: hns3: fix port base vlan add fail when concurrent with reset (git-fixes).\n- net: hns3: fix software vlan talbe of vlan 0 inconsistent with hardware (git-fixes).\n- net: hns3: handle empty unknown interrupt for VF (git-fixes).\n- net: hns3: modify the return code of hclge_get_ring_chain_from_mbx (git-fixes).\n- net: hns3: refine the process when PF set VF VLAN (git-fixes).\n- net/ibmvnic: Cleanup workaround doing an EOI after partition migration (bsc#1089644 ltc#166495 ltc#165544 git-fixes).\n- net/ice: Add support for enable_iwarp and enable_roce devlink param (bsc#1200502).\n- net/ice: Fix boolean assignment (bsc#1200502).\n- net/ice: Remove unused enum (bsc#1200502).\n- net: ipa: disable HOLB drop when updating timer (git-fixes).\n- net: ipa: HOLB register sometimes must be written twice (git-fixes).\n- net/ipa: ipa_resource: Fix wrong for loop range (git-fixes).\n- net: ipv6: unexport __init-annotated seg6_hmac_init() (bsc#1201218).\n- net: ipv6: unexport __init-annotated seg6_hmac_net_init() (bsc#1201218).\n- net: macb: Align the dma and coherent dma masks (git-fixes).\n- net: mana: Add counter for packet dropped by XDP (bsc#1195651).\n- net: mana: Add counter for XDP_TX (bsc#1195651).\n- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).\n- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).\n- net: mana: Reuse XDP dropped page (bsc#1195651).\n- net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651).\n- net: marvell: mvpp2: increase MTU limit when XDP enabled (git-fixes).\n- net: marvell: prestera: fix double free issue on err path (git-fixes).\n- net: mdio: do not defer probe forever if PHY IRQ provider is missing (git-fixes).\n- net: mdio: unexport __init-annotated mdio_bus_init() (bsc#1201218).\n- net/mlx5: Avoid double clear or set of sync reset requested (git-fixes).\n- net/mlx5: Bridge, ensure dev_name is null-terminated (git-fixes).\n- net/mlx5: Bridge, Fix devlink deadlock on net namespace deletion (git-fixes).\n- net/mlx5: Bridge, take rtnl lock in init error handler (git-fixes).\n- net/mlx5: DR, Cache STE shadow memory (git-fixes).\n- net/mlx5: DR, Do not allow match on IP w/o matching on full ethertype/ip_version (git-fixes).\n- net/mlx5: DR, Fix slab-out-of-bounds in mlx5_cmd_dr_create_fte (jsc#SLE-19253).\n- net/mlx5: DR, Fix the threshold that defines when pool sync is initiated (git-fixes).\n- net/mlx5e: Add missing increment of count (jsc#SLE-19253).\n- net/mlx5e: Avoid field-overflowing memcpy() (git-fixes).\n- net/mlx5e: Avoid implicit modify hdr for decap drop rule (jsc#SLE-19253).\n- net/mlx5e: CT: Fix queued up restore put() executing after relevant ft release (git-fixes).\n- net/mlx5e: Do not treat small ceil values as unlimited in HTB offload (git-fixes).\n- net/mlx5e: Fix broken SKB allocation in HW-GRO (jsc#SLE-19253).\n- net/mlx5e: Fix handling of wrong devices during bond netevent (git-fixes).\n- net/mlx5e: Fix module EEPROM query (git-fixes).\n- net/mlx5e: Fix the calling of update_buffer_lossy() API (git-fixes).\n- net/mlx5e: Fix trust state reset in reload (git-fixes).\n- net/mlx5e: Fix wrong calculation of header index in HW_GRO (jsc#SLE-19253).\n- net/mlx5e: Fix wrong return value on ioctl EEPROM query failure (git-fixes).\n- net/mlx5e: Fix wrong source vport matching on tunnel rule (jsc#SLE-19253).\n- net/mlx5e: IPsec: Fix crypto offload for non TCP/UDP encapsulated traffic (git-fixes).\n- net/mlx5e: IPsec: Fix tunnel mode crypto offload for non TCP/UDP traffic (git-fixes).\n- net/mlx5e: kTLS, Use CHECKSUM_UNNECESSARY for device-offloaded packets (git-fixes).\n- net/mlx5e: Lag, Do not skip fib events on current dst (git-fixes).\n- net/mlx5e: Lag, Fix fib_info pointer assignment (git-fixes).\n- net/mlx5e: Lag, Fix use-after-free in fib event handler (git-fixes).\n- net/mlx5e: Lag, Only handle events from highest priority multipath entry (git-fixes).\n- net/mlx5e: MPLSoUDP decap, fix check for unsupported matches (git-fixes).\n- net/mlx5e: SHAMPO, reduce TIR indication (jsc#SLE-19253).\n- net/mlx5: E-Switch, Fix uninitialized variable modact (git-fixes).\n- net/mlx5e: TC, Reject rules with drop and modify hdr action (git-fixes).\n- net/mlx5e: TC, Reject rules with forward and drop actions (git-fixes).\n- net/mlx5e: Use struct_group() for memcpy() region (git-fixes).\n- net/mlx5: Fix a race on command flush flow (git-fixes).\n- net/mlx5: Fix deadlock in sync reset flow (git-fixes).\n- net/mlx5: Fix matching on inner TTC (jsc#SLE-19253).\n- net/mlx5: Fix offloading with ESWITCH_IPV4_TTL_MODIFY_ENABLE (jsc#SLE-19253).\n- net/mlx5: Fix possible deadlock on rule deletion (git-fixes).\n- net/mlx5: Fix size field in bufferx_reg struct (git-fixes).\n- net/mlx5: Fix slab-out-of-bounds while reading resource dump menu (git-fixes).\n- net/mlx5: Fix tc max supported prio for nic mode (git-fixes).\n- net/mlx5: Fix wrong limitation of metadata match on ecpf (git-fixes).\n- net/mlx5: Update the list of the PCI supported devices (git-fixes).\n- net/mlx5: Use del_timer_sync in fw reset flow of halting poll (git-fixes).\n- net: mvmdio: fix compilation warning (git-fixes).\n- net: netvsc: remove break after return (git-fixes).\n- net: phy: ax88772a: fix lost pause advertisement configuration (git-fixes).\n- net: phy: broadcom: Fix brcm_fet_config_init() (git-fixes).\n- net: phy: correct spelling error of media in documentation (git-fixes).\n- net: phy: DP83822: clear MISR2 register to disable interrupts (git-fixes).\n- net: phy: dp83867: retrigger SGMII AN when link change (git-fixes).\n- net: phy: Fix race condition on link status change (git-fixes).\n- net: phy: marvell10g: fix return value on error (git-fixes).\n- net: phy: marvell: Fix invalid comparison in the resume and suspend functions (git-fixes).\n- net: phy: marvell: Fix MDI-x polarity setting in 88e1118-compatible PHYs (git-fixes).\n- net: phy: marvell: Fix RGMII Tx/Rx delays setting in 88e1121-compatible PHYs (git-fixes).\n- net: phy: mediatek: remove PHY mode check on MT7531 (git-fixes).\n- net: phy: meson-gxl: fix interrupt handling in forced mode (git-fixes).\n- net: phy: meson-gxl: improve link-up behavior (git-fixes).\n- net: phy: micrel: Allow probing without .driver_data (git-fixes).\n- net: phy: micrel: Do not use kszphy_suspend/resume for KSZ8061 (git-fixes).\n- net: phy: micrel: Pass .probe for KS8737 (git-fixes).\n- net: phy: mscc: Add MODULE_FIRMWARE macros (git-fixes).\n- net: phy: mscc-miim: reject clause 45 register accesses (git-fixes).\n- net: qlogic: check the return value of dma_alloc_coherent() in qed_vf_hw_prepare() (git-fixes).\n- net: rose: fix UAF bugs caused by timer handler (git-fixes).\n- net: sfc: add missing xdp queue reinitialization (git-fixes).\n- net: sfc: ef10: fix memory leak in efx_ef10_mtd_probe() (git-fixes).\n- net: sfc: fix memory leak due to ptp channel (git-fixes).\n- net: sfc: fix using uninitialized xdp tx_queue (git-fixes).\n- net/smc: Avoid warning of possible recursive locking (git-fixes).\n- net/smc: fix connection leak (git-fixes).\n- net/smc: fixes for converting from \u0027struct smc_cdc_tx_pend **\u0027 to \u0027struct smc_wr_tx_pend_priv *\u0027 (git-fixes).\n- net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() (git-fixes).\n- net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error cause by server (git-fixes).\n- net/smc: fix unexpected SMC_CLC_DECL_ERR_REGRMB error generated by client (git-fixes).\n- net/smc: non blocking recvmsg() return -EAGAIN when no data and signal_pending (git-fixes).\n- net/smc: postpone sk_refcnt increment in connect() (git-fixes).\n- net/smc: remove redundant re-assignment of pointer link (git-fixes).\n- net/smc: Remove unused function declaration (git-fixes).\n- net/smc: Reset conn-\u003elgr when link group registration fails (git-fixes).\n- net/smc: set ini-\u003esmcrv2.ib_dev_v2 to NULL if SMC-Rv2 is unavailable (git-fixes).\n- net/smc: sync err code when tcp connection was refused (git-fixes).\n- net/smc: Transfer remaining wait queue entries during fallback (git-fixes).\n- net/smc: Transitional solution for clcsock race issue (git-fixes).\n- net/smc: Use a mutex for locking \u0027struct smc_pnettable\u0027 (git-fixes).\n- net/smc: use memcpy instead of snprintf to avoid out of bounds read (git-fixes).\n- net: stmmac: fix gcc-10 -Wrestrict warning (git-fixes).\n- net: stmmac: Fix signed/unsigned wreckage (git-fixes).\n- net: stmmac: socfpga: add runtime suspend/resume callback for stratix10 platform (git-fixes).\n- net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (git-fixes).\n- net: usb: asix: do not force pause frames support (git-fixes).\n- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (git-fixes).\n- net: usb: ax88179_178a: Fix packet receiving (git-fixes).\n- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990 (git-fixes).\n- net: usb: qmi_wwan: Add support for Dell DW5829e (git-fixes).\n- Netvsc: Call hv_unmap_memory() in the netvsc_device_remove() (bsc#1183682).\n- net/x25: Fix null-ptr-deref caused by x25_disconnect (git-fixes).\n- net: xfrm: unexport __init-annotated xfrm4_protocol_init() (bsc#1201218).\n- nfc: hci: fix sleep in atomic context bugs in nfc_hci_hcp_message_tx (git-fixes).\n- nfc: nci: add flush_workqueue to prevent uaf (git-fixes).\n- nfc: nci: fix sleep in atomic context bugs caused by nci_skb_alloc (git-fixes).\n- nfc: netlink: fix sleep in atomic bug when firmware download timeout (git-fixes).\n- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).\n- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).\n- nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs (git-fixes).\n- nfc: NULL out the dev-\u003erfkill to prevent UAF (git-fixes).\n- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).\n- nfc: pn533: Fix buggy cleanup order (git-fixes).\n- nfc: port100: fix use-after-free in port100_send_complete (git-fixes).\n- nfc: st21nfca: fix incorrect sizing calculations in EVT_TRANSACTION (git-fixes).\n- nfc: st21nfca: fix incorrect validating logic in EVT_TRANSACTION (git-fixes).\n- nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling (git-fixes).\n- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).\n- nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() (git-fixes).\n- nfp: flower: fix ida_idx not being released (git-fixes).\n- NFS: Avoid duplicate uncached readdir calls on eof (git-fixes).\n- NFSD: allow delegation state ids to be revoked and then freed (bsc#1192483).\n- NFSD: allow lock state ids to be revoked and then freed (bsc#1192483).\n- NFSD: allow open state ids to be revoked and then freed (bsc#1192483).\n- nfsd: destroy percpu stats counters after reply cache shutdown (git-fixes).\n- NFSD: do not admin-revoke NSv4.0 state ids (bsc#1192483).\n- NFSD: Fix a write performance regression (bsc#1197016).\n- NFSD: fix crash on COPY_NOTIFY with special stateid (git-fixes).\n- NFSD: Fix nsfd startup race (again) (git-fixes).\n- nfsd: Fix null-ptr-deref in nfsd_fill_super() (git-fixes).\n- NFSD: Fix READDIR buffer overflow (git-fixes).\n- NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1195957).\n- NFSD: Fix verifier returned in stable WRITEs (git-fixes).\n- NFSD: Fix zero-length NFSv3 WRITEs (git-fixes).\n- NFSD: more robust allocation failure handling in nfsd_file_cache_init (git-fixes).\n- NFSD: nfsd4_setclientid_confirm mistakenly expires confirmed client (git-fixes).\n- NFS: Do not loop forever in nfs_do_recoalesce() (git-fixes).\n- NFS: Do not overfill uncached readdir pages (git-fixes).\n- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).\n- NFS: Do not report ENOSPC write errors twice (git-fixes).\n- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).\n- NFS: Do not report flush errors in nfs_write_end() (git-fixes).\n- NFS: Do not report writeback errors in nfs_getattr() (git-fixes).\n- NFS: Do not skip directory entries when doing uncached readdir (git-fixes).\n- NFS: do not store \u0027struct cred *\u0027 in struct nfs_access_entry (git-fixes).\n- NFSD: prepare for supporting admin-revocation of state (bsc#1192483).\n- NFSD: Replace use of rwsem with errseq_t (bsc#1196960).\n- NFS: Ensure the server had an up to date ctime before hardlinking (git-fixes).\n- NFS: Ensure the server had an up to date ctime before renaming (git-fixes).\n- NFS: fix broken handling of the softreval mount option (git-fixes).\n- NFS: Fix initialisation of nfs_client cl_flags field (git-fixes).\n- NFS: fsync() should report filesystem errors over EINTR/ERESTARTSYS (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- NFS: limit use of ACCESS cache for negative responses (bsc#1196570).\n- NFS: Memory allocation failures are not server fatal errors (git-fixes).\n- NFS: NFSv2/v3 clients should never be setting NFS_CAP_XATTR (git-fixes).\n- NFS: pass cred explicitly for access tests (git-fixes).\n- NFS: Remove an incorrect revalidation in nfs4_update_changeattr_locked() (git-fixes).\n- NFS: Return valid errors from nfs2/3_decode_dirent() (git-fixes).\n- NFS: Use of mapping_set_error() results in spurious errors (git-fixes).\n- NFSv4.1: do not retry BIND_CONN_TO_SESSION on session error (git-fixes).\n- NFSv4.1 mark qualified async operations as MOVEABLE tasks (git-fixes).\n- NFSv42: Do not fail clone() unless the OP_CLONE operation failed (git-fixes).\n- NFSv42: Fix pagecache invalidation after COPY/CLONE (git-fixes).\n- NFSv4: Do not invalidate inode attributes on delegation return (git-fixes).\n- NFSv4: Fix another issue with a list iterator pointing to the head (git-fixes).\n- NFSv4: fix open failure with O_ACCMODE flag (git-fixes).\n- NFSv4: nfs_atomic_open() can race when looking up a non-regular file (git-fixes).\n- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).\n- nl80211: correctly check NL80211_ATTR_REG_ALPHA2 size (git-fixes).\n- nl80211: fix locking in nl80211_set_tx_bitrate_mask() (git-fixes).\n- nl80211: Handle nla_memdup failures in handle_nan_filter (git-fixes).\n- nl80211: show SSID for P2P_GO interfaces (git-fixes).\n- nl80211: Update bss channel on channel switch for P2P_CLIENT (git-fixes).\n- nl80211: validate S1G channel width (git-fixes).\n- ntb_hw_switchtec: Fix bug with more than 32 partitions (git-fixes).\n- ntb_hw_switchtec: Fix pff ioread to read into mmio_part_cfg_all (git-fixes).\n- ntb: intel: fix port config status offset for SPR (git-fixes).\n- n_tty: wake up poll(POLLRDNORM) on receiving data (git-fixes).\n- nvme: add verbose error logging (bsc#1200567). Update config files.\n- nvme: also mark passthrough-only namespaces ready in nvme_update_ns_info (git-fixes).\n- nvme: do not return an error from nvme_configure_metadata (git-fixes).\n- nvme: expose cntrltype and dctype through sysfs (jsc#SLE-23643).\n- nvme: fix a possible use-after-free in controller reset during load (git-fixes).\n- nvme-multipath: use vmalloc for ANA log buffer (bsc#1193787).\n- nvme: send uevent on connection up (jsc#SLE-23643).\n- objtool: Add frame-pointer-specific function ignore (bsc#1193277).\n- objtool: Fix code relocs vs weak symbols (git-fixes).\n- objtool: Fix type of reloc::addend (git-fixes).\n- objtool: Ignore unwind hints for ignored functions (bsc#1193277).\n- ocfs2: fix crash when initialize filecheck kobj fails (bsc#1197920).\n- octeontx2-af: Add a \u0027rvu_free_bitmap()\u0027 function (gix-fixes).\n- octeontx2-af: Fix some memory leaks in the error handling path of \u0027cgx_lmac_init()\u0027 (git-fixes).\n- of: base: Fix phandle argument length mismatch error message (git-fixes).\n- of: base: Improve argument length mismatch error (git-fixes).\n- of/fdt: Do not worry about non-memory region overlap for no-map (git-fixes).\n- of: overlay: do not break notify on NOTIFY_{OK|STOP} (git-fixes).\n- of: Support more than one crash kernel regions for kexec -s (git-fixes).\n- of: unittest: 64 bit dma address test requires arch support (git-fixes).\n- of: unittest: fix warning on PowerPC frame size warning (git-fixes).\n- of: unittest: update text of expected warnings (git-fixes).\n- pahole 1.22 required for full BTF features. also recommend pahole for kernel-source to make the kernel buildable with standard config\n- PCI: aardvark: Add support for DEVCAP2, DEVCTL2, LNKCAP2 and LNKCTL2 registers on emulated bridge (git-fixes).\n- PCI: aardvark: Add support for ERR interrupt on emulated bridge (git-fixes).\n- PCI: aardvark: Add support for masking MSI interrupts (git-fixes).\n- PCI: aardvark: Add support for PME interrupts (git-fixes).\n- PCI: aardvark: Assert PERST# when unbinding driver (git-fixes).\n- PCI: aardvark: Clear all MSIs at setup (git-fixes).\n- PCI: aardvark: Comment actions in driver remove method (git-fixes).\n- PCI: aardvark: Disable bus mastering when unbinding driver (git-fixes).\n- PCI: aardvark: Disable common PHY when unbinding driver (git-fixes).\n- PCI: aardvark: Disable link training when unbinding driver (git-fixes).\n- PCI: aardvark: Do not mask irq when mapping (git-fixes).\n- PCI: aardvark: Drop __maybe_unused from advk_pcie_disable_phy() (git-fixes).\n- PCI: aardvark: Enable MSI-X support (git-fixes).\n- PCI: aardvark: Fix memory leak in driver unbind (git-fixes).\n- PCI: aardvark: Fix reading MSI interrupt number (git-fixes).\n- PCI: aardvark: Fix reading PCI_EXP_RTSTA_PME bit on emulated bridge (git-fixes).\n- PCI: aardvark: Fix setting MSI address (git-fixes).\n- PCI: aardvark: Fix support for MSI interrupts (git-fixes).\n- PCI: aardvark: Fix support for PME requester on emulated bridge (git-fixes).\n- PCI: aardvark: Make msi_domain_info structure a static driver structure (git-fixes).\n- PCI: aardvark: Make MSI irq_chip structures static driver structures (git-fixes).\n- PCI: aardvark: Mask all interrupts when unbinding driver (git-fixes).\n- PCI: aardvark: Optimize writing PCI_EXP_RTCTL_PMEIE and PCI_EXP_RTSTA_PME on emulated bridge (git-fixes).\n- PCI: aardvark: Refactor unmasking summary MSI interrupt (git-fixes).\n- PCI: aardvark: Remove irq_mask_ack() callback for INTx interrupts (git-fixes).\n- PCI: aardvark: Replace custom PCIE_CORE_INT_* macros with PCI_INTERRUPT_* (git-fixes).\n- PCI: aardvark: Rewrite IRQ code to chained IRQ handler (git-fixes).\n- PCI: aardvark: Update comment about link going down after link-up (git-fixes).\n- PCI: aardvark: Use dev_fwnode() instead of of_node_to_fwnode(dev-\u003eof_node) (git-fixes).\n- PCI: aardvark: Use separate INTA interrupt for emulated root bridge (git-fixes).\n- PCI/ACPI: Allow D3 only if Root Port can signal and wake from D3 (git-fixes).\n- PCI: Add ACS quirk for Pericom PI7C9X2G switches (bsc#1199390).\n- PCI/AER: Clear MULTI_ERR_COR/UNCOR_RCV bits (git-fixes).\n- PCI: Avoid broken MSI on SB600 USB devices (git-fixes).\n- PCI: cadence: Fix find_first_zero_bit() limit (git-fixes).\n- PCI: dwc: Fix setting error return on MSI DMA mapping failure (git-fixes).\n- PCI: endpoint: Fix alignment fault error in copy tests (git-fixes).\n- PCI: endpoint: Fix misused goto label (git-fixes).\n- PCI: fu740: Force 2.5GT/s for initial device probe (git-fixes).\n- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).\n- PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI (bsc#1200845).\n- PCI: hv: Fix interrupt mapping for multi-MSI (bsc#1200845).\n- PCI: hv: Fix multi-MSI to allow more than one MSI vector (bsc#1200845).\n- PCI: hv: Fix NUMA node assignment when kernel boots with custom NUMA topology (git-fixes).\n- PCI: hv: Reuse existing IRTE allocation in compose_msi_msg() (bsc#1200845).\n- PCI: imx6: Allow to probe when dw_pcie_wait_for_link() fails (git-fixes).\n- PCI: imx6: Fix PERST# start-up sequence (git-fixes).\n- PCI: Mark all AMD Navi10 and Navi14 GPU ATS as broken (git-fixes).\n- PCI: microchip: Fix potential race in interrupt handling (git-fixes).\n- PCI: mvebu: Fix configuring secondary bus of PCIe Root Port via emulated bridge (git-fixes).\n- PCI: mvebu: Fix device enumeration regression (git-fixes).\n- PCI: mvebu: Fix support for bus mastering and PCI_COMMAND on emulated bridge (git-fixes).\n- PCI: mvebu: Fix support for PCI_BRIDGE_CTL_BUS_RESET on emulated bridge (git-fixes).\n- PCI: mvebu: Setup PCIe controller to Root Complex mode (git-fixes).\n- PCI: pci-bridge-emul: Add definitions for missing capabilities registers (git-fixes).\n- PCI: pci-bridge-emul: Add description for class_revision field (git-fixes).\n- PCI: pciehp: Add Qualcomm quirk for Command Completed erratum (git-fixes).\n- PCI: pciehp: Clear cmd_busy bit in polling mode (git-fixes).\n- PCI/PM: Power up all devices during runtime resume (git-fixes).\n- PCI: qcom: Fix runtime PM imbalance on probe errors (git-fixes).\n- PCI: qcom: Fix unbalanced PHY init on probe errors (git-fixes).\n- PCI: rockchip: Fix find_first_zero_bit() limit (git-fixes).\n- PCI/switchtec: Add Gen4 automotive device IDs (git-fixes).\n- PCI: Work around Intel I210 ROM BAR overlap defect (git-fixes).\n- pcmcia: db1xxx_ss: restrict to MIPS_DB1XXX boards (git-fixes).\n- perf: Copy perf_event_attr::sig_data on modification (git fixes).\n- perf/core: Do not pass task around when ctx sched in (git-fixes).\n- perf/core: Fix address filter parser for multiple filters (git fixes).\n- perf/core: Fix cgroup event list management (git fixes).\n- perf/core: Fix perf_cgroup_switch() (git fixes).\n- perf/core: Fix perf_mmap fail when CONFIG_PERF_USE_VMALLOC enabled (git fixes).\n- perf: Fix list corruption in perf_cgroup_switch() (git fixes).\n- perf/x86/intel/pt: Fix address filter config for 32-bit kernel (git fixes).\n- perf/x86/intel/pt: Fix crash with stop filters in single-range mode (git fixes).\n- perf/x86/intel/uncore: Make uncore_discovery clean for 64 bit addresses (bsc#1197304).\n- perf/x86/intel: Update the FRONTEND MSR mask on Sapphire Rapids (git fixes).\n- phy: amlogic: fix error path in phy_g12a_usb3_pcie_probe() (git-fixes).\n- phy: amlogic: meson8b-usb2: fix shared reset control use (git-fixes).\n- phy: amlogic: meson8b-usb2: Use dev_err_probe() (git-fixes).\n- phy: amlogic: phy-meson-gxl-usb2: fix shared reset controller use (git-fixes).\n- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).\n- phy: broadcom: Kconfig: Fix PHY_BRCM_USB config option (git-fixes).\n- phy: dphy: Correct clk_pre parameter (git-fixes).\n- phy: dphy: Correct lpx parameter and its derivatives(ta_{get,go,sure}) (git-fixes).\n- phy: mapphone-mdm6600: Fix PM error handling in phy_mdm6600_probe (git-fixes).\n- phy: phy-brcm-usb: fixup BCM4908 support (git-fixes).\n- phy: qcom-qmp: fix pipe-clock imbalance on power-on failure (git-fixes).\n- phy: qcom-qmp: fix reset-controller leak on probe errors (git-fixes).\n- phy: qcom-qmp: fix struct clk leak on probe errors (git-fixes).\n- phy: samsung: exynos5250-sata: fix missing device put in probe error paths (git-fixes).\n- phy: samsung: Fix missing of_node_put() in exynos_sata_phy_probe (git-fixes).\n- phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() (git-fixes).\n- phy: ti: Add missing pm_runtime_disable() in serdes_am654_probe (git-fixes).\n- phy: ti: Fix missing sentinel for clk_div_table (git-fixes).\n- phy: ti: omap-usb2: Fix error handling in omap_usb2_enable_clocks (git-fixes).\n- phy: usb: Leave some clocks running during suspend (git-fixes).\n- phy: xilinx: zynqmp: Fix bus width setting for SGMII (git-fixes).\n- pinctrl: bcm2835: Fix a few error paths (git-fixes).\n- pinctrl: bcm63xx: fix unmet dependency on REGMAP for GPIO_REGMAP (git-fixes).\n- pinctrl: fix loop in k210_pinconf_get_drive() (git-fixes).\n- pinctrl: intel: Fix a glitch when updating IRQ flags on a preconfigured line (git-fixes).\n- pinctrl: intel: fix unexpected interrupt (git-fixes).\n- pinctrl: k210: Fix bias-pull-up (git-fixes).\n- pinctrl: mediatek: Fix missing of_node_put() in mtk_pctrl_init (git-fixes).\n- pinctrl: mediatek: moore: Fix build error (git-fixes).\n- pinctrl: mediatek: mt8195: enable driver on mtk platforms (git-fixes).\n- pinctrl: mediatek: mt8365: fix IES control pins (git-fixes).\n- pinctrl: mediatek: paris: Fix \u0027argument\u0027 argument type for mtk_pinconf_get() (git-fixes).\n- pinctrl: mediatek: paris: Fix PIN_CONFIG_BIAS_* readback (git-fixes).\n- pinctrl: mediatek: paris: Fix pingroup pin config state readback (git-fixes).\n- pinctrl: mediatek: paris: Skip custom extra pin config dump for virtual GPIOs (git-fixes).\n- pinctrl: microchip-sgpio: lock RMW access (git-fixes).\n- pinctrl: microchip sgpio: use reset driver (git-fixes).\n- pinctrl: mvebu: Fix irq_of_parse_and_map() return value (git-fixes).\n- pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe (git-fixes).\n- pinctrl: npcm: Fix broken references to chip-\u003eparent_device (git-fixes).\n- pinctrl: nuvoton: npcm7xx: Rename DS() macro to DSTR() (git-fixes).\n- pinctrl: nuvoton: npcm7xx: Use %zu printk format for ARRAY_SIZE() (git-fixes).\n- pinctrl: pinconf-generic: Print arguments for bias-pull-* (git-fixes).\n- pinctrl: pinctrl-aspeed-g6: remove FWQSPID group in pinctrl (git-fixes).\n- pinctrl: pistachio: fix use of irq_of_parse_and_map() (git-fixes).\n- pinctrl: renesas: checker: Fix miscalculation of number of states (git-fixes).\n- pinctrl: renesas: core: Fix possible null-ptr-deref in sh_pfc_map_resources() (git-fixes).\n- pinctrl: renesas: r8a77470: Reduce size for narrow VIN1 channel (git-fixes).\n- pinctrl: renesas: r8a779a0: Fix GPIO function on I2C-capable pins (git-fixes).\n- pinctrl: renesas: rzn1: Fix possible null-ptr-deref in sh_pfc_map_resources() (git-fixes).\n- pinctrl/rockchip: Add missing of_node_put() in rockchip_pinctrl_probe (git-fixes).\n- pinctrl: rockchip: fix RK3308 pinmux bits (git-fixes).\n- pinctrl: samsung: drop pin banks references on error paths (git-fixes).\n- pinctrl: samsung: fix missing GPIOLIB on ARM64 Exynos config (git-fixes).\n- pinctrl: stm32: Do not call stm32_gpio_get() for edge triggered IRQs in EOI (git-fixes).\n- pinctrl: stm32: Keep pinctrl block clock enabled when LEVEL IRQ requested (git-fixes).\n- pinctrl: sunxi: fix f1c100s uart2 function (git-fixes).\n- pinctrl: sunxi: Fix H616 I2S3 pin data (git-fixes).\n- pinctrl: sunxi: Use unique lockdep classes for IRQs (git-fixes).\n- pinctrl: tegra: tegra194: drop unused pin groups (git-fixes).\n- pinctrl: tigerlake: Revert \u0027Add Alder Lake-M ACPI ID\u0027 (git-fixes).\n- ping: fix the sk_bound_dev_if match in ping_lookup (bsc#1195826).\n- ping: remove pr_err from ping_lookup (bsc#1195826).\n- pipe: Fix missing lock in pipe_resize_ring() (git-fixes).\n- platform/chrome: cros_ec_debugfs: detach log reader wq from devm (git-fixes).\n- platform/chrome: cros_ec: fix error handling in cros_ec_register() (git-fixes).\n- platform/chrome: cros_ec_typec: Check for EC device (git-fixes).\n- platform/chrome: Re-introduce cros_ec_cmd_xfer and use it for ioctls (git-fixes).\n- platform: finally disallow IRQ0 in platform_get_irq() and its ilk (git-fixes).\n- platform/surface: aggregator: Fix initialization order when compiling as builtin module (git-fixes).\n- platform/surface: surface3-wmi: Simplify resource management (git-fixes).\n- platform/x86: Add Intel Software Defined Silicon driver (jsc#SLE-18938).\n- platform/x86: asus-wmi: Add support for custom fan curves (bsc#1198058).\n- platform/x86: asus-wmi: Delete impossible condition (bsc#1198058).\n- platform/x86: asus-wmi: Fix driver not binding when fan curve control probe fails (git-fixes).\n- platform/x86: asus-wmi: Fix regression when probing for fan curve control (bsc#1198058).\n- platform/x86: asus-wmi: Fix \u0027unsigned \u0027retval\u0027 is never less than zero\u0027 smatch warning (bsc#1198058).\n- platform/x86: asus-wmi: Potential buffer overflow in asus_wmi_evaluate_method_buf() (git-fixes).\n- platform/x86: gigabyte-wmi: Add support for B450M DS3H-CF (git-fixes).\n- platform/x86: gigabyte-wmi: Add Z690M AORUS ELITE AX DDR4 support (git-fixes).\n- platform/x86: huawei-wmi: check the return value of device_create_file() (git-fixes).\n- platform/x86: intel-hid: fix _DSM function index handling (git-fixes).\n- platform/x86/intel/sdsi: Fix bug in multi packet reads (jsc#SLE-18901).\n- platform/x86/intel/sdsi: Handle leaky bucket (jsc#SLE-18901).\n- platform/x86/intel/sdsi: Poll on ready bit for writes (jsc#SLE-18901).\n- platform/x86: panasonic-laptop: de-obfuscate button codes (git-fixes).\n- platform/x86: panasonic-laptop: do not report duplicate brightness key-presses (git-fixes).\n- platform/x86: panasonic-laptop: filter out duplicate volume up/down/mute keypresses (git-fixes).\n- platform/x86: panasonic-laptop: revert \u0027Resolve hotkey double trigger bug\u0027 (git-fixes).\n- platform/x86: panasonic-laptop: sort includes alphabetically (git-fixes).\n- platform/x86: samsung-laptop: Fix an unsigned comparison which can never be negative (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the RWC NANOTE P8 AY07J 2-in-1 (git-fixes).\n- PM: core: keep irq flags in device_pm_check_callbacks() (git-fixes).\n- PM / devfreq: exynos-ppmu: Fix refcount leak in of_get_devfreq_events (git-fixes).\n- PM / devfreq: rk3399_dmc: Disable edev on remove() (git-fixes).\n- PM: domains: Fix initialization of genpd\u0027s next_wakeup (git-fixes).\n- PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove() (git-fixes).\n- PM: hibernate: fix __setup handler error handling (git-fixes).\n- PM: hibernate: Remove register_nosave_region_late() (git-fixes).\n- PM: s2idle: ACPI: Fix wakeup interrupts handling (git-fixes).\n- PM: suspend: fix return value of __setup handler (git-fixes).\n- PM: wakeup: simplify the output logic of pm_show_wakelocks() (git-fixes).\n- pNFS: Avoid a live lock condition in pnfs_update_layout() (git-fixes).\n- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).\n- powerpc/64: Move paca allocation later in boot (bsc#1190812).\n- powerpc/64s: Add CPU_FTRS_POWER10 to ALWAYS mask (jsc#SLE-13521 git-fixes).\n- powerpc/64s: Add CPU_FTRS_POWER9_DD2_2 to CPU_FTRS_ALWAYS mask (bsc#1061840 git-fixes).\n- powerpc/64s: Do not use DSISR for SLB faults (bsc#1194869).\n- powerpc/64s/radix: Fix huge vmap false positive (bsc#1156395).\n- powerpc: add link stack flush mitigation status in debugfs (bsc#1157038 bsc#1157923 ltc#182612 git-fixes).\n- powerpc/bpf: Update ldimm64 instructions during extra pass (bsc#1194869).\n- powerpc: Do not select HAVE_IRQ_EXIT_ON_IRQ_STACK (bsc#1194869).\n- powerpc: Enable the DAWR on POWER9 DD2.3 and above (bsc#1055117 ltc#159753).\n- powerpc/fadump: fix PT_LOAD segment for boot memory area (bsc#1103269 ltc#169948 git-fixes).\n- powerpc/fadump: opt out from freeing pages on cma activation failure (bsc#1195099 ltc#196102).\n- powerpc/fadump: register for fadump as early as possible (bsc#1179439 ltc#190038).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/lib/sstep: Fix \u0027sthcx\u0027 instruction (bsc#1156395).\n- powerpc/mce: Modify the real address error logging messages (jsc#SLE-18194).\n- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).\n- powerpc/perf: Do not use perf_hw_context for trace IMC PMU (bsc#1156395).\n- powerpc/perf: Fix power10 event alternatives (jsc#SLE-13513 git-fixes).\n- powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes).\n- powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending (bsc#1156395).\n- powerpc/perf: Fix the threshold compare group constraint for power10 (bsc#1194869).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- powerpc/powernv: Add __init attribute to eligible functions (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Get L1D flush requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Get STF barrier requirements from device-tree (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/powernv: Remove POWER9 PVR version check for entry and uaccess flushes (bsc#1188885 ltc#193722 git-fixes).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).\n- powerpc/pseries: Parse control memory access error (jsc#SLE-18194).\n- powerpc/pseries: read the lpar name from the firmware (bsc#1187716 ltc#193451).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- powerpc: Set crashkernel offset to mid of RMA region (bsc#1190812).\n- powerpc/sysdev: fix incorrect use to determine if list is empty (bsc#1065729).\n- powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).\n- powerpc/vdso: Fix incorrect CFI in gettimeofday.S (bsc#1199173 ltc#197388).\n- powerpc/vdso: Remove cvdso_call_time macro (bsc#1199173 ltc#197388).\n- powerpc/xive: Add a debugfs file to dump EQs (bsc#1194409 ltc#195810).\n- powerpc/xive: Add some error handling code to \u0027xive_spapr_init()\u0027 (git-fixes).\n- powerpc/xive: Change the debugfs file \u0027xive\u0027 into a directory (bsc#1194409 ltc#195810).\n- powerpc/xive: Export XIVE IPI information for online-only processors (bsc#1194409 ltc#195810).\n- powerpc/xive: Fix refcount leak in xive_spapr_init (git-fixes).\n- powerpc/xive: fix return value of __setup handler (bsc#1065729).\n- powerpc/xive: Introduce an helper to print out interrupt characteristics (bsc#1194409 ltc#195810).\n- powerpc/xive: Introduce xive_core_debugfs_create() (bsc#1194409 ltc#195810).\n- powerpc/xive: Rename the \u0027cpus\u0027 debugfs file to \u0027ipis\u0027 (bsc#1194409 ltc#195810).\n- power: reset: gemini-poweroff: Fix IRQ check in gemini_poweroff_probe (git-fixes).\n- power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init (git-fixes).\n- power: supply: axp20x_battery: properly report current when discharging (git-fixes).\n- power: supply: axp288-charger: Set Vhold to 4.4V (git-fixes).\n- power: supply: axp288_fuel_gauge: Drop BIOS version check from \u0027T3 MRD\u0027 DMI quirk (git-fixes).\n- power: supply: axp288_fuel_gauge: Fix battery reporting on the One Mix 1 (git-fixes).\n- power: supply: bq24190_charger: Fix bq24190_vbus_is_enabled() wrong false return (git-fixes).\n- power: supply: sbs-charger: Do not cancel work that is not initialized (git-fixes).\n- power: supply: wm8350-power: Add missing free in free_charger_irq (git-fixes).\n- power: supply: wm8350-power: Handle error for wm8350_register_irq (git-fixes).\n- pps: clients: gpio: Propagate return value from pps_gpio_probe (git-fixes).\n- printk: Add panic_in_progress helper (bsc#1197894).\n- printk: disable optimistic spin during panic (bsc#1197894).\n- proc: bootconfig: Add null pointer check (git-fixes).\n- proc: fix documentation and description of pagemap (git-fixes).\n- procfs: prevent unprivileged processes accessing fdinfo dir (git-fixes).\n- psi: fix \u0027defined but not used\u0027 warnings when (git-fixes)\n- ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc#1198413).\n- pvpanic: Fix typos in the comments (git-fixes).\n- pwm: lp3943: Fix duty calculation in case period was clamped (git-fixes).\n- pwm: lpc18xx-sct: Initialize driver data and hardware before pwmchip_add() (git-fixes).\n- pwm: raspberrypi-poe: Fix endianness in firmware struct (git-fixes).\n- qed: display VF trust config (git-fixes).\n- qede: confirm skb is allocated before using (git-fixes).\n- qed: fix ethtool register dump (jsc#SLE-19001).\n- qed: return status of qed_iov_get_link (git-fixes).\n- qla2xxx: add -\u003emap_queues support for nvme (bsc#1195823).\n- qlcnic: dcb: default to returning -EOPNOTSUPP (git-fixes).\n- raid5: introduce MD_BROKEN (git-fixes).\n- random: check for signal_pending() outside of need_resched() check (git-fixes).\n- random: wake up /dev/random writers after zap (git-fixes).\n- random: wire up fops-\u003esplice_{read,write}_iter() (git-fixes).\n- ray_cs: Check ioremap return value (git-fixes).\n- RDMA/cma: Do not change route.addr.src_addr outside state checks (git-fixes).\n- RDMA/cma: Use correct address when leaving multicast group (git-fixes).\n- RDMA/core: Fix ib_qp_usecnt_dec() called when error (jsc#SLE-19249).\n- RDMA/core: Set MR type in ib_reg_user_mr (git-fixes).\n- RDMA/hfi1: Fix use-after-free bug for mm struct (git-fixes).\n- RDMA/ib_srp: Fix a deadlock (git-fixes).\n- RDMA/irdma: Fix netdev notifications for vlan\u0027s (git-fixes).\n- RDMA/irdma: Fix Passthrough mode in VM (git-fixes).\n- RDMA/irdma: Fix possible crash due to NULL netdev in notifier (git-fixes).\n- RDMA/irdma: Flush iWARP QP if modified to ERR from RTR state (git-fixes).\n- RDMA/irdma: Prevent some integer underflows (git-fixes).\n- RDMA/irdma: Reduce iWARP QP destroy time (git-fixes).\n- RDMA/irdma: Remove incorrect masking of PD (git-fixes).\n- RDMA/irdma: Set protocol based on PF rdma_mode flag (bsc#1200502).\n- RDMA/mlx4: Do not continue event handler after memory allocation failure (git-fixes).\n- RDMA/mlx5: Add a missing update of cache-\u003elast_add (git-fixes).\n- RDMA/mlx5: Do not remove cache MRs when a delay is needed (git-fixes).\n- RDMA/mlx5: Fix memory leak in error flow for subscribe event routine (git-fixes).\n- RDMA/mlx5: Fix the flow of a miss in the allocation of a cache ODP MR (git-fixes).\n- RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit() (jsc#SLE-19249).\n- RDMA/rtrs-clt: Fix possible double free in error case (git-fixes).\n- RDMA/rtrs-clt: Move free_permit from free_clt to rtrs_clt_close (git-fixes).\n- RDMA/rxe: Change variable and function argument to proper type (jsc#SLE-19249).\n- RDMA/rxe: Check the last packet by RXE_END_MASK (git-fixes).\n- RDMA/rxe: Fix ref error in rxe_av.c (jsc#SLE-19249).\n- RDMA/siw: Fix a condition race issue in MPA request processing (git-fixes).\n- RDMA/siw: Fix broken RDMA Read Fence/Resume logic (git-fixes).\n- RDMA/siw: Fix refcounting leak in siw_create_qp() (jsc#SLE-19249).\n- RDMA/ucma: Protect mc during concurrent multicast leaves (git-fixes).\n- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).\n- regmap-irq: Fix offset/index mismatch in read_sub_irq_data() (git-fixes).\n- regmap-irq: Update interrupt clear register for proper reset (git-fixes).\n- regulator: atc260x: Fix missing active_discharge_on setting (git-fixes).\n- regulator: core: Fix enable_count imbalance with EXCLUSIVE_GET (git-fixes).\n- regulator: core: fix false positive in regulator_late_cleanup() (git-fixes).\n- regulator: da9121: Fix uninit-value in da9121_assign_chip_model() (git-fixes).\n- regulator: mt6315: Enforce regulator-compatible, not name (git-fixes).\n- regulator: mt6315-regulator: fix invalid allowed mode (git-fixes).\n- regulator: pfuze100: Fix refcount leak in pfuze_parse_regulators_dt (git-fixes).\n- regulator: qcom_smd: fix for_each_child.cocci warnings (git-fixes).\n- regulator: qcom_smd: Fix up PM8950 regulator configuration (git-fixes).\n- regulator: rpi-panel: Handle I2C errors/timing to the Atmel (git-fixes).\n- regulator: scmi: Fix refcount leak in scmi_regulator_probe (git-fixes).\n- regulator: wm8994: Add an off-on delay for WM8994 variant (git-fixes).\n- remoteproc: Fix count check in rproc_coredump_write() (git-fixes).\n- remoteproc: imx_rproc: Ignore create mem entry for resource table (git-fixes).\n- remoteproc: qcom: Fix missing of_node_put in adsp_alloc_memory_region (git-fixes).\n- remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region (git-fixes).\n- remoteproc: qcom_wcnss: Add missing of_node_put() in wcnss_alloc_memory_region (git-fixes).\n- reset: tegra-bpmp: Restore Handle errors in BPMP response (git-fixes).\n- Revert \u0027drm/amd/display: Fix DCN3 B0 DP Alt Mapping\u0027 (git-fixes).\n- Revert \u0027drm/amdgpu/display: set vblank_disable_immediate for DC\u0027 (git-fixes).\n- Revert \u0027svm: Add warning message for AVIC IPI invalid target\u0027 (git-fixes).\n- rfkill: make new event layout opt-in (git-fixes).\n- rfkill: uapi: fix RFKILL_IOCTL_MAX_SIZE ioctl request definition (git-fixes).\n- riscv: Fix fill_callchain return value (git fixes).\n- rpmsg: qcom_smd: Fix irq_of_parse_and_map() return value (git-fixes).\n- rpmsg: qcom_smd: Fix redundant channel-\u003eregistered assignment (git-fixes).\n- rpmsg: qcom_smd: Fix returning 0 if irq_of_parse_and_map() fails (git-fixes).\n- rpmsg: virtio: Fix possible double free in rpmsg_probe() (git-fixes).\n- rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev() (git-fixes).\n- rpmsg: virtio: Fix the unregistration of the device rpmsg_ctrl (git-fixes).\n- rtc: check if __rtc_read_time was successful (git-fixes).\n- rtc: fix use-after-free on device removal (git-fixes).\n- rtc: ftrtc010: Fix error handling in ftrtc010_rtc_probe (git-fixes).\n- rtc: ftrtc010: Use platform_get_irq() to get the interrupt (git-fixes).\n- rtc: mc146818-lib: fix locking in mc146818_set_time (git-fixes).\n- rtc: mc146818-lib: Fix the AltCentury for AMD platforms (git-fixes).\n- rtc: mt6397: check return value after calling platform_get_resource() (git-fixes).\n- rtc: mxc: Silence a clang warning (git-fixes).\n- rtc: pcf2127: fix bug when reading alarm registers (git-fixes).\n- rtc: pl031: fix rtc features null pointer dereference (git-fixes).\n- rtc: sun6i: Fix time overflow handling (git-fixes).\n- rtc: wm8350: Handle error for wm8350_register_irq (git-fixes).\n- rtl818x: Prevent using not initialized queues (git-fixes).\n- rtlwifi: Use pr_warn instead of WARN_ONCE (git-fixes).\n- rtw88: 8821c: fix debugfs rssi value (git-fixes).\n- rtw88: 8821c: support RFE type4 wifi NIC (git-fixes).\n- rtw88: Disable PCIe ASPM while doing NAPI poll on 8821CE (git-fixes).\n- rtw88: rtw8821c: enable rfe 6 devices (git-fixes).\n- s390/crypto: fix scatterwalk_unmap() callers in AES-GCM (git-fixes).\n- s390/ctcm: fix potential memory leak (git-fixes).\n- s390/ctcm: fix variable dereferenced before check (git-fixes).\n- s390/dasd: fix data corruption for ESE devices (git-fixes).\n- s390/dasd: Fix read for ESE with blksize 4k (git-fixes).\n- s390/dasd: Fix read inconsistency for ESE DASD devices (git-fixes).\n- s390/dasd: prevent double format of tracks for ESE devices (git-fixes).\n- s390/entry: fix duplicate tracking of irq nesting level (git-fixes).\n- s390/extable: fix exception table sorting (git-fixes).\n- s390/kexec_file: fix error handling when applying relocations (git-fixes).\n- s390/kexec: fix memory leak of ipl report buffer (git-fixes).\n- s390/kexec: fix return code handling (git-fixes).\n- s390/lcs: fix variable dereferenced before check (git-fixes).\n- s390/mcck: isolate SIE instruction when setting CIF_MCCK_GUEST flag (git-fixes).\n- s390/module: fix loading modules with a lot of relocations (git-fixes).\n- s390/nmi: handle guarded storage validity failures for KVM guests (git-fixes).\n- s390/nmi: handle vector validity failures for KVM guests (git-fixes).\n- s390/perf: obtain sie_block from the right address (bsc#1200315 LTC#198473).\n- s390/setup: avoid reserving memory above identity mapping (git-fixes).\n- s390/smp: sort out physical vs virtual pointers usage (git-fixes).\n- sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl (git-fixes).\n- sata_fsl: fix warning in remove_proc_entry when rmmod sata_fsl (git-fixes).\n- sc16is7xx: Fix for incorrect data being transmitted (git-fixes).\n- sched/core: Export pelt_thermal_tp (git-fixes)\n- sched/core: Fix forceidle balancing (git-fixes)\n- sched/core: Mitigate race (git-fixes)\n- sched/cpuacct: Fix charge percpu cpuusage (git-fixes)\n- sched/cpuacct: Fix user/system in shown cpuacct.usage* (git-fixes)\n- sched/debug: Remove mpol_get/put and task_lock/unlock from (git-fixes)\n- sched: Define and initialize a flag to identify valid PASID in the task (jsc#SLE-24350).\n- sched/fair: Consider CPU affinity when allowing NUMA imbalance in find_idlest_group() (bnc#1193431).\n- sched/fair: Fix fault in reweight_entity (git fixes (sched/core)).\n- sched/fair: Revise comment about lb decision matrix (git-fixes)\n- sched: Fix balance_push() vs __sched_setscheduler() (git-fixes)\n- sched: Fix yet more sched_fork() races (git fixes (sched/core)).\n- sched/membarrier: Fix membarrier-rseq fence command missing (git-fixes)\n- sched/numa: Adjust imb_numa_nr to a better approximation of memory channels (bnc#1193431).\n- sched/numa: Apply imbalance limitations consistently (bnc#1193431).\n- sched/numa: Do not swap tasks between nodes when spare capacity is available (bnc#1193431).\n- sched/numa: Initialise numa_migrate_retry (bnc#1193431).\n- sched/pasid: Add a kABI workaround (jsc#SLE-24350).\n- sched/pelt: Fix attach_entity_load_avg() corner case (git-fixes)\n- sched/pelt: Relax the sync of util_sum with util_avg (git-fixes)\n- sched/psi: report zeroes for CPU full at the system level (git-fixes)\n- sched/rt: Plug rt_mutex_setprio() vs push_rt_task() race (git-fixes)\n- sched/rt: Try to restart rt period timer when rt runtime (git-fixes)\n- sched/scs: Reset task stack state in bringup_cpu() (git-fixes)\n- sched/sugov: Ignore \u0027busy\u0027 filter when rq is capped by (git-fixes)\n- sched: Teach the forced-newidle balancer about CPU affinity (git-fixes)\n- scripts/faddr2line: Fix overlapping text section failures (git-fixes).\n- scsi: block: pm: Always set request queue runtime active in blk_post_runtime_resume() (bsc#1198802).\n- scsi: block: PM fix blk_post_runtime_resume() args (bsc#1198802).\n- scsi: core: Query VPD size before getting full page (git-fixes).\n- scsi: dc395x: Fix a missing check on list iterator (git-fixes).\n- scsi: elx: efct: Do not use GFP_KERNEL under spin lock (git-fixes).\n- scsi: fnic: Fix a tracing statement (git-fixes).\n- scsi: fnic: Replace DMA mask of 64 bits with 47 bits (bsc#1199631).\n- scsi: hisi_sas: Add more logs for runtime suspend/resume (bsc#1198802).\n- scsi: hisi_sas: Change permission of parameter prot_mask (git-fixes).\n- scsi: hisi_sas: Fix rescan after deleting a disk (git-fixes).\n- scsi: hisi_sas: Fix some issues related to asd_sas_port-\u003ephy_list (bsc#1198802).\n- scsi: hisi_sas: Increase debugfs_dump_index after dump is completed (bsc#1198806).\n- scsi: hisi_sas: Initialise devices in .slave_alloc callback (bsc#1198802).\n- scsi: hisi_sas: Limit users changing debugfs BIST count value (bsc#1198803).\n- scsi: hisi_sas: Remove unused variable and check in hisi_sas_send_ata_reset_each_phy() (git-fixes).\n- scsi: hisi_sas: Wait for phyup in hisi_sas_control_phy() (bsc#1198802).\n- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: iscsi: Add helper functions to manage iscsi_cls_conn (bsc#1198410).\n- scsi: iscsi: Add helper to remove a session from the kernel (bsc#1198410).\n- scsi: iscsi: Allow iscsi_if_stop_conn() to be called from kernel (bsc#1198410).\n- scsi: iscsi: Clean up bound endpoints during shutdown (bsc#1198410).\n- scsi: iscsi: Fix HW conn removal use after free (bsc#1198410).\n- scsi: iscsi: Fix session removal on shutdown (bsc#1198410).\n- scsi: libiscsi: Teardown iscsi_cls_conn gracefully (bsc#1198410).\n- scsi: libsas: Add flag SAS_HA_RESUMING (bsc#1198802).\n- scsi: libsas: Add spin_lock/unlock() to protect asd_sas_port-\u003ephy_list (bsc#1198802).\n- scsi: libsas: Defer works of new phys during suspend (bsc#1198802).\n- scsi: libsas: Do not always drain event workqueue for HA resume (bsc#1198802).\n- scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes).\n- scsi: libsas: Insert PORTE_BROADCAST_RCVD event for resuming host (bsc#1198802).\n- scsi: libsas: Keep host active while processing events (bsc#1198802).\n- scsi: libsas: Refactor sas_queue_deferred_work() (bsc#1198802).\n- scsi: libsas: Resume host while sending SMP I/Os (bsc#1198802).\n- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).\n- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).\n- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).\n- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).\n- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).\n- scsi: lpfc: Alter FPIN stat accounting logic (bsc#1200045).\n- scsi: lpfc: Change FA-PWWN detection methodology (bsc#1200045).\n- scsi: lpfc: Change VMID registration to be based on fabric parameters (bsc#1200045).\n- scsi: lpfc: Clear fabric topology flag before initiating a new FLOGI (bsc#1200045).\n- scsi: lpfc: Commonize VMID code location (bsc#1201193).\n- scsi: lpfc: Copyright updates for 14.2.0.0 patches (bsc#1197675).\n- scsi: lpfc: Copyright updates for 14.2.0.2 patches (bsc#1200045).\n- scsi: lpfc: Correct BDE DMA address assignment for GEN_REQ_WQE (bsc#1200045).\n- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).\n- scsi: lpfc: Correct CRC32 calculation for congestion stats (bsc#1200045).\n- scsi: lpfc: Decrement outstanding gidft_inp counter if lpfc_err_lost_link() (bsc#1200045).\n- scsi: lpfc: Drop lpfc_no_handler() (bsc#1197675).\n- scsi: lpfc: Expand setting ELS_ID field in ELS_REQUEST64_WQE (bsc#1200045).\n- scsi: lpfc: Fill in missing ndlp kref puts in error paths (bsc#1200045).\n- scsi: lpfc: Fix additional reference counting in lpfc_bsg_rport_els() (bsc#1200045).\n- scsi: lpfc: Fix broken SLI4 abort path (bsc#1197675).\n- scsi: lpfc: Fix call trace observed during I/O with CMF enabled (bsc#1200045).\n- scsi: lpfc: Fix diagnostic fw logging after a function reset (bsc#1200045).\n- scsi: lpfc: Fix dmabuf ptr assignment in lpfc_ct_reject_event() (bsc#1200045).\n- scsi: lpfc: Fix element offset in __lpfc_sli_release_iocbq_s4() (bsc#1200045).\n- scsi: lpfc: Fix field overload in lpfc_iocbq data structure (bsc#1200045).\n- scsi: lpfc: Fix locking for lpfc_sli_iocbq_lookup() (bsc#1197675).\n- scsi: lpfc: Fix ndlp put following a LOGO completion (bsc#1200045).\n- scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI (bsc#1200045).\n- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).\n- scsi: lpfc: Fix queue failures when recovering from PCI parity error (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp() (bsc#1200045).\n- scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock (bsc#1200045).\n- scsi: lpfc: Fix split code for FLOGI on FCoE (bsc#1200045).\n- scsi: lpfc: Fix typos in comments (bsc#1197675).\n- scsi: lpfc: Fix unload hang after back to back PCI EEH faults (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Improve PCI EEH Error and Recovery Handling (bsc#1197675 bsc#1196478).\n- scsi: lpfc: Inhibit aborts if external loopback plug is inserted (bsc#1200045).\n- scsi: lpfc: Introduce FC_RSCN_MEMENTO flag for tracking post RSCN completion (bsc#1200045).\n- scsi: lpfc: Kill lpfc_bus_reset_handler() (bsc#1197675).\n- scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg() (bsc#1200045).\n- scsi: lpfc: Move MI module parameter check to handle dynamic disable (bsc#1200045).\n- scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT (bsc#1200045).\n- scsi: lpfc: Reduce log messages seen after firmware download (bsc#1197675).\n- scsi: lpfc: Refactor cleanup of mailbox commands (bsc#1200045).\n- scsi: lpfc: Register for Application Services FC-4 type in Fabric topology (bsc#1200045).\n- scsi: lpfc: Remove failing soft_wwn support (bsc#1197675).\n- scsi: lpfc: Remove false FDMI NVMe FC-4 support for NPIV ports (bsc#1200045).\n- scsi: lpfc: Remove NVMe support if kernel has NVME_FC disabled (bsc#1197675).\n- scsi: lpfc: Remove redundant flush_workqueue() call (bsc#1197675).\n- scsi: lpfc: Remove redundant lpfc_sli_prep_wqe() call (bsc#1200045).\n- scsi: lpfc: Remove unnecessary null ndlp check in lpfc_sli_prep_wqe() (bsc#1200045).\n- scsi: lpfc: Remove unnecessary NULL pointer assignment for ELS_RDF path (bsc#1200045).\n- scsi: lpfc: Remove unneeded variable (bsc#1200045).\n- scsi: lpfc: Requeue SCSI I/O to upper layer when fw reports link down (bsc#1200045).\n- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).\n- scsi: lpfc: Revise FDMI reporting of supported port speed for trunk groups (bsc#1200045).\n- scsi: lpfc: Rework FDMI initialization after link up (bsc#1200045).\n- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).\n- scsi: lpfc: SLI path split: Introduce lpfc_prep_wqe (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor Abort paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor base ELS paths and the FLOGI path (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor BSG paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor CT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor fast and slow paths to native SLI4 (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor FDISC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor lpfc_iocbq (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_ACC paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor LS_RJT paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor misc ELS paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor PLOGI/PRLI/ADISC/LOGO paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor SCSI paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor the RSCN/SCR/RDF/EDC/FARPR paths (bsc#1197675).\n- scsi: lpfc: SLI path split: Refactor VMID paths (bsc#1197675).\n- scsi: lpfc: Transition to NPR state upon LOGO cmpl if link down or aborted (bsc#1200045).\n- scsi: lpfc: Tweak message log categories for ELS/FDMI/NVMe rescan (bsc#1200045).\n- scsi: lpfc: Update fc_prli_sent outstanding only after guaranteed IOCB submit (bsc#1200045).\n- scsi: lpfc: Update lpfc version to 14.2.0.0 (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.1 (bsc#1197675).\n- scsi: lpfc: Update lpfc version to 14.2.0.2 (bsc#1200045).\n- scsi: lpfc: Update lpfc version to 14.2.0.3 (bsc#1200045).\n- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).\n- scsi: lpfc: Update stat accounting for READ_STATUS mbox command (bsc#1200045).\n- scsi: lpfc: Use fc_block_rport() (bsc#1197675).\n- scsi: lpfc: Use irq_set_affinity() (bsc#1197675).\n- scsi: lpfc: Use kcalloc() (bsc#1197675).\n- scsi: lpfc: Use list_for_each_entry_safe() in rscn_recovery_check() (bsc#1200045).\n- scsi: lpfc: Use rport as argument for lpfc_chk_tgt_mapped() (bsc#1197675).\n- scsi: lpfc: Use rport as argument for lpfc_send_taskmgmt() (bsc#1197675).\n- scsi: lpfc: Use sg_dma_address() and sg_dma_len() macros for NVMe I/O (bsc#1200045).\n- scsi: lpfc: Zero SLI4 fcp_cmnd buffer\u0027s fcpCntl0 field (bsc#1200045).\n- scsi: mpt3sas: Fix incorrect 4GB boundary check (git-fixes).\n- scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() (git-fixes).\n- scsi: mpt3sas: Page fault in reply q processing (git-fixes).\n- scsi: mpt3sas: Use cached ATA Information VPD page (git-fixes).\n- scsi: mvsas: Add spin_lock/unlock() to protect asd_sas_port-\u003ephy_list (bsc#1198802).\n- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).\n- scsi: pm8001: Fix abort all task initialization (git-fixes).\n- scsi: pm8001: Fix command initialization in pm8001_chip_ssp_tm_req() (git-fixes).\n- scsi: pm8001: Fix command initialization in pm80XX_send_read_log() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_chip_sata_req() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_chip_ssp_io_req() (git-fixes).\n- scsi: pm8001: Fix le32 values handling in pm80xx_set_sas_protocol_timer_config() (git-fixes).\n- scsi: pm8001: Fix NCQ NON DATA command completion handling (git-fixes).\n- scsi: pm8001: Fix NCQ NON DATA command task initialization (git-fixes).\n- scsi: pm8001: Fix payload initialization in pm80xx_encrypt_update() (git-fixes).\n- scsi: pm8001: Fix payload initialization in pm80xx_set_thermal_config() (git-fixes).\n- scsi: pm80xx: Enable upper inbound, outbound queues (git-fixes).\n- scsi: pm80xx: Mask and unmask upper interrupt vectors 32-63 (git-fixes).\n- scsi: qedi: Fix ABBA deadlock in qedi_process_tmf_resp() and qedi_process_cmd_cleanup_resp() (git-fixes).\n- scsi: qedi: Use QEDI_MODE_NORMAL for error handling (bsc#1198410).\n- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).\n- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).\n- scsi: qla2xxx: Add devids and conditionals for 28xx (bsc#1195823).\n- scsi: qla2xxx: Add ql2xnvme_queues module param to configure number of NVMe queues (bsc#1195823).\n- scsi: qla2xxx: Add qla2x00_async_done() for async routines (bsc#1195823).\n- scsi: qla2xxx: Add retry for exec firmware (bsc#1195823).\n- scsi: qla2xxx: Check for firmware dump already collected (bsc#1195823).\n- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).\n- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).\n- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).\n- scsi: qla2xxx: edif: Fix clang warning (bsc#1195823).\n- scsi: qla2xxx: edif: Fix inconsistent check of db_flags (bsc#1195823).\n- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).\n- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).\n- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).\n- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce connection thrash (bsc#1195823).\n- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).\n- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).\n- scsi: qla2xxx: edif: Remove unneeded variable (bsc#1200046).\n- scsi: qla2xxx: edif: Replace list_for_each_safe with list_for_each_entry_safe (bsc#1195823).\n- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).\n- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).\n- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).\n- scsi: qla2xxx: edif: Tweak trace message (bsc#1195823).\n- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).\n- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).\n- scsi: qla2xxx: Fix crash during module load unload test (bsc#1197661).\n- scsi: qla2xxx: Fix device reconnect in loop topology (bsc#1195823).\n- scsi: qla2xxx: Fix disk failure to rediscover (bsc#1197661).\n- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).\n- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).\n- scsi: qla2xxx: Fix hang due to session stuck (bsc#1197661).\n- scsi: qla2xxx: Fix incorrect reporting of task management failure (bsc#1197661).\n- scsi: qla2xxx: Fix laggy FC remote port session recovery (bsc#1197661).\n- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).\n- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).\n- scsi: qla2xxx: Fix loss of NVMe namespaces after driver reload test (bsc#1197661).\n- scsi: qla2xxx: Fix missed DMA unmap for aborted commands (bsc#1200046).\n- scsi: qla2xxx: Fix missed DMA unmap for NVMe ls requests (bsc#1197661).\n- scsi: qla2xxx: Fix N2N inconsistent PLOGI (bsc#1197661).\n- scsi: qla2xxx: Fix premature hw access after PCI error (bsc#1195823).\n- scsi: qla2xxx: Fix scheduling while atomic (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session in gpdb (bsc#1195823).\n- scsi: qla2xxx: Fix stuck session of PRLI reject (bsc#1197661).\n- scsi: qla2xxx: Fix T10 PI tag escape and IP guard options for 28XX adapters (bsc#1195823).\n- scsi: qla2xxx: Fix typos in comments (bsc#1197661).\n- scsi: qla2xxx: Fix warning for missing error code (bsc#1195823).\n- scsi: qla2xxx: Fix warning message due to adisc being flushed (bsc#1195823).\n- scsi: qla2xxx: Fix wrong FDMI data for 64G adapter (bsc#1195823).\n- scsi: qla2xxx: Implement ref count for SRB (bsc#1195823).\n- scsi: qla2xxx: Increase max limit of ql2xnvme_queues (bsc#1197661).\n- scsi: qla2xxx: Reduce false trigger to login (bsc#1197661).\n- scsi: qla2xxx: Refactor asynchronous command initialization (bsc#1195823).\n- scsi: qla2xxx: Remove a declaration (bsc#1195823).\n- scsi: qla2xxx: Remove free_sg command flag (bsc#1200046).\n- scsi: qla2xxx: Remove setting of \u0027req\u0027 and \u0027rsp\u0027 parameters (bsc#1201160).\n- scsi: qla2xxx: Remove unneeded flush_workqueue() (bsc#1200046).\n- scsi: qla2xxx: Remove unused qla_sess_op_cmd_list from scsi_qla_host_t (bsc#1195823).\n- scsi: qla2xxx: Remove unused \u0027ql_dm_tgt_ex_pct\u0027 parameter (bsc#1201160).\n- scsi: qla2xxx: Stop using the SCSI pointer (bsc#1197661).\n- scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() (bsc#1195823).\n- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.200-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.300-k (bsc#1195823).\n- scsi: qla2xxx: Update version to 10.02.07.400-k (bsc#1197661).\n- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).\n- scsi: qla2xxx: Use correct feature type field during RFF_ID processing (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for port_state_str (bsc#1197661).\n- scsi: qla2xxx: Use named initializers for q_dev_state (bsc#1197661).\n- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).\n- scsi: scsi_transport_fc: Fix FPIN Link Integrity statistics counters (git-fixes).\n- scsi: sr: Do not leak information in ioctl (git-fixes).\n- scsi: ufs: core: Exclude UECxx from SFR dump list (git-fixes).\n- scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled (git-fixes).\n- scsi: ufs: qcom: Fix ufs_qcom_resume() (git-fixes).\n- scsi: virtio-scsi: Eliminate anonymous module_init and module_exit (git-fixes).\n- scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() (git-fixes).\n- selftest: KVM: Add open sev dev helper (bsc#1194526).\n- selftests/bpf: Remove unused variable in tc_tunnel prog (git-fixes).\n- selftests: firmware: Fix the request_firmware_into_buf() test for XZ format (git-fixes).\n- selftests: firmware: Use smaller dictionary for XZ compression (git-fixes).\n- selftests: fix check for circular KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM (bsc#1194526).\n- selftests: KVM: Add /x86_64/sev_migrate_tests to .gitignore (bsc#1194526).\n- selftests: KVM: Fix check for !POLLIN in demand_paging_test (bsc#1194526).\n- selftests: kvm: Remove absent target file (git-fixes).\n- selftests: KVM: sev_migrate_tests: Fix sev_ioctl() (bsc#1194526).\n- selftests: kvm/x86: Fix the warning in lib/x86_64/processor.c (bsc#1194526).\n- selftests/powerpc: Add test for real address error handling (jsc#SLE-18194).\n- serial: 8250: Also set sticky MCR bits in console restoration (git-fixes).\n- serial: 8250_aspeed_vuart: add PORT_ASPEED_VUART port type (git-fixes).\n- serial: 8250_aspeed_vuart: Fix potential NULL dereference in aspeed_vuart_probe (git-fixes).\n- serial: 8250: core: Remove unneeded linux/pm_runtime.h (git-fixes).\n- serial: 8250: Correct the clock for EndRun PTP/1588 PCIe device (git-fixes).\n- serial: 8250_fintek: Check SER_RS485_RTS_* only with RS485 (git-fixes).\n- serial: 8250: Fix race condition in RTS-after-send handling (git-fixes).\n- serial: 8250: fix XOFF/XON sending when DMA is used (git-fixes).\n- serial: 8250_lpss: Balance reference count for PCI DMA device (git-fixes).\n- serial: 8250_mid: Balance reference count for PCI DMA device (git-fixes).\n- serial: 8250_mtk: Fix register address for XON/XOFF character (git-fixes).\n- serial: 8250_mtk: Fix UART_EFR register address (git-fixes).\n- serial: 8250: pxa: Remove unneeded linux/pm_runtime.h (git-fixes).\n- serial: core: Fix the definition name in the comment of UPF_* flags (git-fixes).\n- serial: cpm_uart: Fix build error without CONFIG_SERIAL_CPM_CONSOLE (git-fixes).\n- serial: digicolor-usart: Do not allow CS5-6 (git-fixes).\n- serial: imx: fix overrun interrupts in DMA mode (git-fixes).\n- serial: meson: acquire port-\u003elock in startup() (git-fixes).\n- serial: msm_serial: disable interrupts in __msm_console_write() (git-fixes).\n- serial: pch: do not overwrite xmit-\u003ebuf[0] by x_char (git-fixes).\n- serial: rda-uart: Do not allow CS5-6 (git-fixes).\n- serial: samsung_tty: do not unlock port-\u003elock for uart_write_wakeup() (git-fixes).\n- serial: sh-sci: Do not allow CS5-6 (git-fixes).\n- serial: sifive: Report actual baud base rather than fixed 115200 (git-fixes).\n- serial: sifive: Sanitize CSIZE and c_iflag (git-fixes).\n- serial: st-asc: Sanitize CSIZE and correct PARENB for CS7 (git-fixes).\n- serial: stm32-usart: Correct CSIZE, bits, and parity (git-fixes).\n- serial: txx9: Do not allow CS5-6 (git-fixes).\n- sfc: Do not free an empty page_ring (git-fixes).\n- sfc: fallback for lack of xdp tx queues (bsc#1196306).\n- sfc: last resort fallback for lack of xdp tx queues (bsc#1196306).\n- sfc: Use swap() instead of open coding it (bsc#1196306).\n- sfc: use swap() to make code cleaner (bsc#1196306).\n- skbuff: fix coalescing for page_pool fragment recycling (bsc#1190336).\n- slimbus: qcom: Fix IRQ check in qcom_slim_probe (git-fixes).\n- slip: fix macro redefine warning (git-fixes).\n- smb3: add mount parm nosparse (bsc#1193629).\n- smb3: add trace point for lease not found issue (bsc#1193629).\n- smb3: add trace point for oplock not found (bsc#1193629).\n- smb3: check for null tcon (bsc#1193629).\n- smb3: cleanup and clarify status of tree connections (bsc#1193629).\n- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1193629).\n- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1193629).\n- smb3: fix incorrect session setup check for multiuser mounts (bsc#1193629).\n- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1193629).\n- smb3: fix snapshot mount option (bsc#1193629).\n- smb3 improve error message when mount options conflict with posix (bsc#1193629).\n- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1193629).\n- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1193629).\n- smb3 move more common protocol header definitions to smbfs_common (bsc#1193629).\n- smb3: send NTLMSSP version information (bsc#1193629).\n- smp: Fix offline cpu check in flush_smp_call_function_queue() (git-fixes).\n- smsc911x: allow using IRQ0 (git-fixes).\n- soc: aspeed: lpc-ctrl: Block error printing on probe defer cases (git-fixes).\n- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).\n- soc: bcm: Check for NULL return of devm_kzalloc() (git-fixes).\n- soc: fsl: Correct MAINTAINERS database (QUICC ENGINE LIBRARY) (git-fixes).\n- soc: fsl: Correct MAINTAINERS database (SOC) (git-fixes).\n- soc: fsl: guts: Add a missing memory allocation failure check (git-fixes).\n- soc: fsl: guts: Revert commit 3c0d64e867ed (git-fixes).\n- soc: fsl: qe: Check of ioremap return value (git-fixes).\n- soc: mediatek: pm-domains: Add wakeup capacity support in power domain (git-fixes).\n- soc: qcom: aoss: Expose send for generic usecase (git-fixes).\n- soc: qcom: aoss: Fix missing put_device call in qmp_get (git-fixes).\n- soc: qcom: aoss: remove spurious IRQF_ONESHOT flags (git-fixes).\n- soc: qcom: llcc: Add MODULE_DEVICE_TABLE() (git-fixes).\n- soc: qcom: ocmem: Fix missing put_device() call in of_get_ocmem (git-fixes).\n- soc: qcom: rpmpd: Check for null return of devm_kcalloc (git-fixes).\n- soc: qcom: smp2p: Fix missing of_node_put() in smp2p_parse_ipc (git-fixes).\n- soc: qcom: smsm: Fix missing of_node_put() in smsm_parse_ipc (git-fixes).\n- soc: rockchip: Fix refcount leak in rockchip_grf_init (git-fixes).\n- soc: ti: ti_sci_pm_domains: Check for null return of devm_kcalloc (git-fixes).\n- soc: ti: wkup_m3_ipc: Fix IRQ check in wkup_m3_ipc_probe (git-fixes).\n- sound/oss/dmasound: fix build when drivers are mixed =y/=m (git-fixes).\n- sound/oss/dmasound: fix \u0027dmasound_setup\u0027 defined but not used (git-fixes).\n- soundwire: intel: fix wrong register name in intel_shim_wake (git-fixes).\n- soundwire: intel: prevent pm_runtime resume prior to system suspend (git-fixes).\n- soundwire: qcom: adjust autoenumeration timeout (git-fixes).\n- speakup-dectlk: Restore pitch setting (git-fixes).\n- spi: atmel-quadspi: Fix the buswidth adjustment between spi-mem and controller (git-fixes).\n- spi: bcm-qspi: fix MSPI only access with bcm_qspi_exec_mem_op() (git-fixes).\n- spi: cadence-quadspi: fix incorrect supports_op() return value (git-fixes).\n- spi: cadence-quadspi: fix protocol setup for non-1-1-X operations (git-fixes).\n- spi: core: add dma_map_dev for __spi_unmap_msg() (git-fixes).\n- spi: Fix erroneous sgs value with min_t() (git-fixes).\n- spi: Fix invalid sgs value (git-fixes).\n- spi: Fix Tegra QSPI example (git-fixes).\n- spi: img-spfi: Fix pm_runtime_get_sync() error checking (git-fixes).\n- spi: mxic: Fix the transmit path (git-fixes).\n- spi: pxa2xx-pci: Balance reference count for PCI DMA device (git-fixes).\n- spi: qcom-qspi: Add minItems to interconnect-names (git-fixes).\n- spi: rockchip: Fix error in getting num-cs property (git-fixes).\n- spi: rockchip: fix missing error on unsupported SPI_CS_HIGH (git-fixes).\n- spi: rockchip: Preset cs-high and clk polarity in setup progress (git-fixes).\n- spi: rockchip: Stop spi slave dma receiver when cs inactive (git-fixes).\n- spi: rockchip: terminate dma transmission when slave abort (git-fixes).\n- spi: spi-cadence: Fix kernel-doc format for resume/suspend (git-fixes).\n- spi: spi-fsl-qspi: check return value after calling platform_get_resource_byname() (git-fixes).\n- spi: spi-mtk-nor: initialize spi controller after resume (git-fixes).\n- spi: spi-rspi: Remove setting {src,dst}_{addr,addr_width} based on DMA direction (git-fixes).\n- spi: spi-ti-qspi: Fix return value handling of wait_for_completion_timeout (git-fixes).\n- spi: spi-zynqmp-gqspi: Handle error for dma_set_mask (git-fixes).\n- spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() (git-fixes).\n- spi: stm32-qspi: Fix wait_cmd timeout in APM mode (git-fixes).\n- spi: tegra114: Add missing IRQ check in tegra_spi_probe (git-fixes).\n- spi: tegra20: Use of_device_get_match_data() (git-fixes).\n- spi: tegra210-quad: Fix missin IRQ check in tegra_qspi_probe (git-fixes).\n- sr9700: sanity check for packet length (bsc#1196836).\n- staging: fbtft: fb_st7789v: reset display before initialization (git-fixes).\n- staging: fbtft: Fix error path in fbtft_driver_module_init() (git-fixes).\n- staging: fieldbus: Fix the error handling path in anybuss_host_common_probe() (git-fixes).\n- staging: gdm724x: fix use after free in gdm_lte_rx() (git-fixes).\n- staging:iio:adc:ad7280a: Fix handing of device address bit reversing (git-fixes).\n- staging: most: dim2: force fcnt=3 on Renesas GEN3 (git-fixes).\n- staging: most: dim2: use device release method (git-fixes).\n- staging: most: dim2: use if statements instead of ?: expressions (git-fixes).\n- staging: mt7621-dts: fix formatting (git-fixes).\n- staging: mt7621-dts: fix LEDs and pinctrl on GB-PC1 devicetree (git-fixes).\n- staging: mt7621-dts: fix pinctrl-0 items to be size-1 items on ethernet (git-fixes).\n- staging: mt7621-dts: fix pinctrl properties for ethernet (git-fixes).\n- staging: rtl8712: fix a potential memory leak in r871xu_drv_init() (git-fixes).\n- staging: rtl8712: fix uninit-value in r871xu_drv_init() (git-fixes).\n- staging: rtl8712: fix uninit-value in usb_read8() and friends (git-fixes).\n- staging: rtl8723bs: Fix access-point mode deadlock (git-fixes).\n- staging: vc04_services: shut up out-of-range warning (git-fixes).\n- staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances (git-fixes).\n- staging: vchiq_core: handle NULL result of find_service_by_handle (git-fixes).\n- staging: vchiq: Move certain declarations to vchiq_arm.h (git-fixes).\n- staging: vchiq: Move vchiq char driver to its own file (git-fixes).\n- staging: vchiq: Refactor vchiq cdev code (git-fixes).\n- staging: wfx: fix an error handling in wfx_init_common() (git-fixes).\n- stddef: Introduce DECLARE_FLEX_ARRAY() helper (git-fixes).\n- stm: ltdc: fix two incorrect NULL checks on list iterator (bsc#1190786)\n- SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367).\n- SUNRPC: Do not dereference non-socket transports in sysfs (git-fixes).\n- SUNRPC: Do not dereference non-socket transports in sysfs - kabi fix (git-fixes).\n- SUNRPC do not resend a task on an offlined transport (git-fixes).\n- SUNRPC: Ensure gss-proxy connects on setup (git-fixes).\n- SUNRPC: Ensure that the gssproxy client can start in a connected state (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- SUNRPC: Fix the svc_deferred_event trace class (git-fixes).\n- SUNRPC: Handle ENOMEM in call_transmit_status() (git-fixes).\n- SUNRPC: Handle low memory situations in call_status() (git-fixes).\n- SUNRPC release the transport of a relocated task with an assigned transport (git-fixes).\n- SUNRPC: svc_tcp_sendmsg() should handle errors from xdr_alloc_bvec() (git-fixes).\n- SUNRPC: Trap RDMA segment overflows (git-fixes).\n- SUNRPC: use different lock keys for INET6 and LOCAL (git-fixes).\n- supported.conf: add intel_sdsi\n- supported.conf: mark pfuze100 regulator as supported (bsc#1199909)\n- supported.conf: Support TPM TIS SPI driver (jsc#SLE-24093)\n- surface: surface3_power: Fix battery readings on batteries without a serial number (git-fixes).\n- swiotlb: max mapping size takes min align mask into account (bsc#1197303).\n- sysrq: do not omit current cpu when showing backtrace of all active CPUs (git-fixes).\n- thermal/core: Fix memory leak in __thermal_cooling_device_register() (git-fixes).\n- thermal: core: Fix TZ_GET_TRIP NULL pointer dereference (git-fixes).\n- thermal: devfreq_cooling: use local ops instead of global ops (git-fixes).\n- thermal/drivers/bcm2711: Do not clamp temperature at zero (git-fixes).\n- thermal/drivers/broadcom: Fix potential NULL dereference in sr_thermal_probe (git-fixes).\n- thermal/drivers/imx_sc_thermal: Fix refcount leak in imx_sc_thermal_probe (git-fixes).\n- thermal/drivers/int340x: Improve the tcc offset saving for suspend/resume (git-fixes).\n- thermal: int340x: Check for NULL after calling kmemdup() (git-fixes).\n- thermal: int340x: Fix attr.show callback prototype (git-fixes).\n- thermal: int340x: fix memory leak in int3400_notify() (git-fixes).\n- thermal: int340x: Increase bitmap size (git-fixes).\n- thunderbolt: Use different lane for second DisplayPort tunnel (git-fixes).\n- tick/nohz: unexport __init-annotated tick_nohz_full_setup() (bsc#1201218).\n- tilcdc: tilcdc_external: fix an incorrect NULL check on list iterator (bsc#1190786)\n- timekeeping: Mark NMI safe time accessors as notrace (git-fixes)\n- timers: Fix warning condition in __run_timers() (git-fixes)\n- TOMOYO: fix __setup handlers return values (git-fixes).\n- tools arch x86: Add Intel SDSi provisiong tool (jsc#SLE-18938).\n- tools: bpftool: Complete metrics list in \u0027bpftool prog profile\u0027 doc (git-fixes).\n- tools: bpftool: Document and add bash completion for -L, -B options (git-fixes).\n- tools: bpftool: Update and synchronise option list in doc and help msg (git-fixes).\n- tpm: Fix buffer access in tpm2_get_tpm_pt() (git-fixes).\n- tpm: Fix error handling in async work (git-fixes).\n- tpm: ibmvtpm: Correct the return value in tpm_ibmvtpm_probe() (bsc#1065729).\n- tpm: use try_get_ops() in tpm-space.c (git-fixes).\n- tps6598x: clear int mask on probe failure (git-fixes).\n- tracing: Do not inc err_log entry count if entry allocation fails (git-fixes).\n- tracing: Dump stacktrace trigger to the corresponding instance (git-fixes).\n- tracing: Fix potential double free in create_var_ref() (git-fixes).\n- tracing: Fix return value of __setup handlers (git-fixes).\n- tracing: Fix return value of trace_pid_write() (git-fixes).\n- tracing: Fix smatch warning for null glob in event_hist_trigger_parse() (git-fixes).\n- tracing: Have trace event string test handle zero length strings (git-fixes).\n- tracing: Have traceon and traceoff trigger honor the instance (git-fixes).\n- tracing/histogram: Fix a potential memory leak for kstrdup() (git-fixes).\n- tracing/histogram: Fix sorting on old \u0027cpu\u0027 value (git-fixes).\n- tracing/osnoise: Force quiescent states while tracing (git-fixes).\n- tracing: Propagate is_signed to expression (git-fixes).\n- tracing: Show kretprobe unknown indicator only for kretprobe_trampoline (bsc#1193277).\n- tty: Fix a possible resource leak in icom_probe (git-fixes).\n- tty: fix deadlock caused by calling printk() under tty_port-\u003elock (git-fixes).\n- tty: goldfish: Fix free_irq() on remove (git-fixes).\n- tty: goldfish: Introduce gf_ioread32()/gf_iowrite32() (git-fixes).\n- tty: goldfish: Use tty_port_destroy() to destroy port (git-fixes).\n- tty: n_gsm: Debug output allocation must use GFP_ATOMIC (git-fixes).\n- tty: n_gsm: Do not ignore write return value in gsmld_output() (git-fixes).\n- tty: n_gsm: fix deadlock in gsmtty_open() (git-fixes).\n- tty: n_gsm: fix encoding of control signal octet bit DV (git-fixes).\n- tty: n_gsm: fix NULL pointer access due to DLCI release (git-fixes).\n- tty: n_gsm: Fix packet data hex dump output (git-fixes).\n- tty: n_gsm: fix proper link termination after failed open (git-fixes).\n- tty: n_gsm: fix wrong modem processing in convergence layer type 2 (git-fixes).\n- tty: n_gsm: fix wrong tty control line for flow control (git-fixes).\n- tty: n_tty: do not look ahead for EOL character past the end of the buffer (git-fixes).\n- tty: n_tty: Restore EOF push handling behavior (git-fixes).\n- tty/serial: digicolor: fix possible null-ptr-deref in digicolor_uart_probe() (git-fixes).\n- tty: serial: fsl_lpuart: fix potential bug when using both of_alias_get_id and ida_simple_get (git-fixes).\n- tty: serial: owl: Fix missing clk_disable_unprepare() in owl_uart_probe (git-fixes).\n- tty: synclink_gt: Fix null-pointer-dereference in slgt_clean() (git-fixes).\n- u64_stats: Disable preemption on 32bit UP+SMP PREEMPT_RT during updates (bsc#1189998).\n- uapi/linux/stddef.h: Add include guards (jsc#SLE-18978).\n- ucounts: Enforce RLIMIT_NPROC not RLIMIT_NPROC+1 (bsc#1194191).\n- udmabuf: validate ubuf-\u003epagecount (git-fixes).\n- udp_tunnel: Fix end of loop test in udp_tunnel_nic_unregister() (git-fixes).\n- usb: cdc-wdm: fix reading stuck on device close (git-fixes).\n- usb: cdns3: Fix issue for clear halt endpoint (git-fixes).\n- usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value (git-fixes).\n- usb: cdnsp: Fixed setting last_trb incorrectly (git-fixes).\n- usb: chipidea: udc: check request status before setting device address (git-fixes).\n- usb: core: Do not hold the device lock while sleeping in do_proc_control() (git-fixes).\n- usb: core: hcd: Add support for deferring roothub registration (git-fixes).\n- usb: dwc2: drd: fix soft connect when gadget is unconfigured (git-fixes).\n- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).\n- usb: dwc2: gadget: do not reset gadget\u0027s driver-\u003ebus (git-fixes).\n- usb: dwc2: gadget: do not try to disable ep0 in dwc2_hsotg_suspend (git-fixes).\n- usb: dwc3: core: Fix tx/rx threshold settings (git-fixes).\n- usb: dwc3: core: Only handle soft-reset in DCTL (git-fixes).\n- usb: dwc3: Decouple USB 2.0 L1 \u0026 L2 events (git-fixes).\n- usb: dwc3: gadget: Change to dev_dbg() when queuing to inactive gadget/ep (git-fixes).\n- usb: dwc3: gadget: ep_queue simplify isoc start condition (git-fixes).\n- usb: dwc3: gadget: Fix IN endpoint max packet size allocation (git-fixes).\n- usb: dwc3: gadget: Give some time to schedule isoc (git-fixes).\n- usb: dwc3: gadget: Ignore Update Transfer cmd params (git-fixes).\n- usb: dwc3: gadget: Let the interrupt handler disable bottom halves (git-fixes).\n- usb: dwc3: gadget: move cmd_endtransfer to extra function (git-fixes).\n- usb: dwc3: gadget: Move null pinter check to proper place (git-fixes).\n- usb: dwc3: gadget: Prevent core from processing stale TRBs (git-fixes).\n- usb: dwc3: gadget: Prevent repeat pullup() (git-fixes).\n- usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback (git-fixes).\n- usb: dwc3: gadget: Return proper request status (git-fixes).\n- usb: dwc3: gadget: Skip checking Update Transfer status (git-fixes).\n- usb: dwc3: gadget: Skip reading GEVNTSIZn (git-fixes).\n- usb: dwc3: gadget: Wait for ep0 xfers to complete during dequeue (git-fixes).\n- usb: dwc3: Issue core soft reset before enabling run/stop (git-fixes).\n- usb: dwc3: omap: fix \u0027unbalanced disables for smps10_out1\u0027 on omap5evm (git-fixes).\n- usb: dwc3: pci: Add \u0027snps,dis_u2_susphy_quirk\u0027 for Intel Bay Trail (git-fixes).\n- usb: dwc3: pci: add support for the Intel Meteor Lake-P (git-fixes).\n- usb: dwc3: pci: add support for the Intel Raptor Lake-S (git-fixes).\n- usb: dwc3: pci: Fix Bay Trail phy GPIO mappings (git-fixes).\n- usb: dwc3: pci: Fix pm_runtime_get_sync() error checking (git-fixes).\n- usb: dwc3: pci: Set the swnode from inside dwc3_pci_quirks() (git-fixes).\n- usb: dwc3: Try usb-role-switch first in dwc3_drd_init (git-fixes).\n- usb: dwc3: xilinx: fix uninitialized return value (git-fixes).\n- usb: ehci: add pci device support for Aspeed platforms (git-fixes).\n- usb: ehci-omap: drop unused ehci_read() function (git-fixes).\n- usb: f_fs: Fix use-after-free for epfile (git-fixes).\n- usb: Fix xhci event ring dequeue pointer ERDP update issue (git-fixes).\n- usb: gadget: configfs: clear deactivation flag in configfs_composite_unbind() (git-fixes).\n- usb: gadget: eliminate anonymous module_init and module_exit (git-fixes).\n- usb: gadget: f_fs: change ep-\u003eep safe in ffs_epfile_io() (git-fixes).\n- usb: gadget: f_fs: change ep-\u003estatus safe in ffs_epfile_io() (git-fixes).\n- USB: gadget: Fix double-free bug in raw_gadget driver (git-fixes).\n- usb: gadget: Fix non-unique driver names in raw-gadget driver (git-fixes).\n- usb: gadget: fix race when gadget driver register via ioctl (git-fixes).\n- usb: gadget: Fix use-after-free bug by not setting udc-\u003edev.driver (git-fixes).\n- usb: gadget: f_uac2: Define specific wTerminalType (git-fixes).\n- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).\n- usb: gadget: rndis: add spinlock for rndis response list (git-fixes).\n- usb: gadget: rndis: check size of RNDIS_MSG_SET command (git-fixes).\n- usb: gadget: rndis: prevent integer overflow in rndis_set_response() (git-fixes).\n- usb: gadget: tegra-xudc: Do not program SPARAM (git-fixes).\n- usb: gadget: tegra-xudc: Fix control endpoint\u0027s definitions (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix host to USB_ROLE_NONE transition (git-fixes).\n- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).\n- usb: gadget: uvc: allow for application to cleanly shutdown (git-fixes).\n- usb: gadget: uvc: Fix crash when encoding data for usb request (git-fixes).\n- usb: gadget: uvc: rename function to be more consistent (git-fixes).\n- usb: gadget: validate endpoint index for xilinx udc (git-fixes).\n- usb: gadget: validate interface OS descriptor requests (git-fixes).\n- USB: hcd-pci: Fully suspend across freeze/thaw cycle (git-fixes).\n- usb: hcd-pci: Use PCI_STD_NUM_BARS when checking standard BARs (git-fixes).\n- USB: host: isp116x: check return value after calling platform_get_resource() (git-fixes).\n- usb: isp1760: Fix out-of-bounds array access (git-fixes).\n- usb: misc: fix improper handling of refcount in uss720_probe() (git-fixes).\n- usb: mtu3: fix USB 3.0 dual-role-switch from device to host (git-fixes).\n- usb: musb: Fix missing of_node_put() in omap2430_probe (git-fixes).\n- usbnet: fix memory allocation in helpers (git-fixes).\n- USB: new quirk for Dell Gen 2 devices (git-fixes).\n- usb: phy: generic: Get the vbus supply (git-fixes).\n- usb: quirks: add a Realtek card reader (git-fixes).\n- usb: quirks: add STRING quirk for VCOM device (git-fixes).\n- usb: raw-gadget: fix handling of dual-direction-capable endpoints (git-fixes).\n- usb: serial: ch341: add support for GW Instek USB2.0-Serial devices (git-fixes).\n- usb: serial: cp210x: add CPI Bulk Coin Recycler id (git-fixes).\n- usb: serial: cp210x: add NCR Retail IO box id (git-fixes).\n- usb: serial: cp210x: add PIDs for Kamstrup USB Meter Reader (git-fixes).\n- usb: serial: ftdi_sio: add support for Brainboxes US-159/235/320 (git-fixes).\n- USB: serial: io_ti: add Agilent E5805A support (git-fixes).\n- usb: serial: option: add Fibocom L610 modem (git-fixes).\n- usb: serial: option: add Fibocom MA510 modem (git-fixes).\n- USB: serial: option: add Quectel BG95 modem (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support (git-fixes).\n- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- usb: serial: option: add support for Cinterion MV32-WA/MV32-WB (git-fixes).\n- usb: serial: option: add support for DW5829e (git-fixes).\n- usb: serial: option: add Telit 0x1057, 0x1058, 0x1075 compositions (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- usb: serial: option: add Telit LE910R1 compositions (git-fixes).\n- usb: serial: option: add ZTE MF286D modem (git-fixes).\n- usb: serial: pl2303: add device id for HP LM930 Display (git-fixes).\n- usb: serial: pl2303: add IBM device IDs (git-fixes).\n- USB: serial: pl2303: add support for more HXN (G) types (git-fixes).\n- usb: serial: pl2303: fix GS type detection (git-fixes).\n- usb: serial: pl2303: fix type detection for odd device (git-fixes).\n- usb: serial: qcserial: add support for Sierra Wireless EM7590 (git-fixes).\n- usb: serial: simple: add Nokia phone driver (git-fixes).\n- usb: serial: whiteheat: fix heap overflow in WHITEHEAT_GET_DTR_RTS (git-fixes).\n- usb: storage: karma: fix rio_karma_init return (git-fixes).\n- usb: storage: ums-realtek: fix error code in rts51x_read_mem() (git-fixes).\n- usb: typec: mux: Check dev_set_name() return value (git-fixes).\n- usb: typec: tcpci: Do not skip cleanup in .remove() on error (git-fixes).\n- usb: typec: tcpci_mt6360: Update for BMC PHY setting (git-fixes).\n- usb: typec: tipd: Forward plug orientation to typec subsystem (git-fixes).\n- usb: typec: ucsi: Fix reuse of completion structure (git-fixes).\n- usb: typec: ucsi: Fix role swapping (git-fixes).\n- usb: ulpi: Call of_node_put correctly (git-fixes).\n- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).\n- usb: usbip: add missing device lock on tweak configuration cmd (git-fixes).\n- usb: usbip: eliminate anonymous module_init and module_exit (git-fixes).\n- usb: usbip: fix a refcount leak in stub_probe() (git-fixes).\n- usb: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes).\n- usb: usbtmc: Fix bug in pipe direction for control transfers (git-fixes).\n- usb: xhci: tegra:Fix PM usage reference leak of tegra_xusb_unpowergate_partitions (git-fixes).\n- usb: zaurus: support another broken Zaurus (git-fixes).\n- use jobs not processors in the constraints jobs is the number of vcpus available to the build, while processors is the total processor count of the machine the VM is running on.\n- vdpasim: allow to enable a vq repeatedly (git-fixes).\n- veth: Ensure eth header is in skb\u0027s linear part (git-fixes).\n- veth: fix races around rq-\u003erx_notify_masked (git-fixes).\n- vfio/ccw: Remove unneeded GFP_DMA (git-fixes).\n- vhost_vdpa: do not setup irq offloading when irq_num 0 (git-fixes).\n- vhost/vsock: do not check owner in vhost_vsock_stop() while releasing (git-fixes).\n- vhost/vsock: fix incorrect used length reported to the guest (git-fixes).\n- video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (git-fixes).\n- video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (git-fixes).\n- video: fbdev: cirrusfb: check pixclock to avoid divide by zero (git-fixes).\n- video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup (git-fixes).\n- video: fbdev: controlfb: Fix COMPILE_TEST build (git-fixes).\n- video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (git-fixes).\n- video: fbdev: matroxfb: set maxvram of vbG200eW to the same as vbG200 to avoid black screen (git-fixes).\n- video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow (git-fixes).\n- video: fbdev: omapfb: acx565akm: replace snprintf with sysfs_emit (git-fixes).\n- video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (git-fixes).\n- video: fbdev: omapfb: panel-dsi-cm: Use sysfs_emit() instead of snprintf() (git-fixes).\n- video: fbdev: omapfb: panel-tpo-td043mtea1: Use sysfs_emit() instead of snprintf() (git-fixes).\n- video: fbdev: pxa3xx-gcu: release the resources correctly in pxa3xx_gcu_probe/remove() (git-fixes).\n- video: fbdev: sm712fb: Fix crash in smtcfb_read() (git-fixes).\n- video: fbdev: sm712fb: Fix crash in smtcfb_write() (git-fixes).\n- video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (git-fixes).\n- video: fbdev: udlfb: properly check endpoint type (bsc#1190497)\n- video: fbdev: udlfb: replace snprintf in show functions with sysfs_emit (git-fixes).\n- video: fbdev: w100fb: Reset global state (git-fixes).\n- virtio-blk: Do not use MAX_DISCARD_SEGMENTS if max_discard_seg is zero (git-fixes).\n- virtio_blk: eliminate anonymous module_init and module_exit (git-fixes).\n- virtio_blk: fix the discard_granularity and discard_alignment queue limits (git-fixes).\n- virtio_console: break out of buf poll on remove (git-fixes).\n- virtio_console: eliminate anonymous module_init and module_exit (git-fixes).\n- virtio: fix virtio transitional ids (git-fixes).\n- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).\n- virtio-net: fix for skb_over_panic inside big mode (git-fixes).\n- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).\n- virtio_net: fix wrong buf address calculation when using xdp (git-fixes).\n- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).\n- virtio-net: realign page_to_skb() after merges (git-fixes).\n- virtio: pci: Fix an error handling path in vp_modern_probe() (git-fixes).\n- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).\n- VMCI: Fix the description of vmci_check_host_caps() (git-fixes).\n- vringh: Fix loop descriptors check in the indirect cases (git-fixes).\n- vsprintf: Fix %pK with kptr_restrict == 0 (bsc#1197889).\n- vsprintf: Fix potential unaligned access (bsc#1198379).\n- vt_ioctl: add array_index_nospec to VT_ACTIVATE (git-fixes).\n- vt_ioctl: fix array_index_nospec in vt_setactivate (git-fixes).\n- vxcan: enable local echo for sent CAN frames (git-fixes).\n- w1: w1_therm: fixes w1_seq for ds28ea00 sensors (git-fixes).\n- watchdog: rti-wdt: Add missing pm_runtime_disable() in probe function (git-fixes).\n- watchdog: rti-wdt: Fix pm_runtime_get_sync() error checking (git-fixes).\n- Watchdog: sp5100_tco: Add initialization using EFCH MMIO (bsc#1199260).\n- watchdog: sp5100_tco: Add support for get_timeleft (bsc#1199260).\n- Watchdog: sp5100_tco: Enable Family 17h+ CPUs (bsc#1199260).\n- Watchdog: sp5100_tco: Move timer initialization into function (bsc#1199260).\n- Watchdog: sp5100_tco: Refactor MMIO base address initialization (bsc#1199260).\n- watchdog: ts4800_wdt: Fix refcount leak in ts4800_wdt_probe (git-fixes).\n- watchdog: wdat_wdt: Stop watchdog when rebooting the system (git-fixes).\n- watch_queue: Actually free the watch (git-fixes).\n- watch_queue: Fix NULL dereference in error cleanup (git-fixes).\n- watch_queue: Free the page array when watch_queue is dismantled (git-fixes).\n- wcn36xx: Differentiate wcn3660 from wcn3620 (git-fixes).\n- wifi: mac80211: fix use-after-free in chanctx code (git-fixes).\n- wilc1000: fix crash observed in AP mode with cfg80211_register_netdevice() (git-fixes).\n- wireguard: queueing: use CFI-safe ptr_ring cleanup function (git-fixes).\n- wireguard: selftests: rename DEBUG_PI_LIST to DEBUG_PLIST (git-fixes).\n- wireguard: socket: free skb in send6 when ipv6 is disabled (git-fixes).\n- wireguard: socket: ignore v6 endpoints when ipv6 is disabled (git-fixes).\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n- x86/boot: Add setup_indirect support in early_memremap_is_setup_data() (bsc#1190497).\n- x86/boot: Fix memremap of setup_indirect structures (bsc#1190497).\n- x86/cc: Move arch/x86/{kernel/cc_platform.c coco/core.c} (jsc#SLE-19924).\n- x86/coco: Add API to handle encryption mask (jsc#SLE-19924).\n- x86/coco: Explicitly declare type of confidential computing platform (jsc#SLE-19924).\n- x86/cpu: Add Xeon Icelake-D to list of CPUs that support PPIN (bsc#1190497).\n- x86/cpufeatures: Re-enable ENQCMD (jsc#SLE-24350).\n- x86/cpu: Load microcode during restore_processor_state() (bsc#1190497).\n- x86/entry: Remove skip_r11rcx (bsc#1201524).\n- x86/fpu: Clear PASID when copying fpstate (jsc#SLE-24350).\n- x86/ibt,xen: Sprinkle the ENDBR (bsc#1201471).\n- x86/kprobes: Add UNWIND_HINT_FUNC on kretprobe_trampoline() (bsc#1193277).\n- x86/kprobes: Fixup return address in generic trampoline handler (bsc#1193277).\n- x86/kprobes: Push a fake return address at kretprobe_trampoline (bsc#1193277).\n- x86/kvmclock: Fix Hyper-V Isolated VM s boot issue when vCPUs 64 (bsc#1183682).\n- x86/kvm: Do not waste memory if kvmclock is disabled (bsc#1183682).\n- x86/MCE/AMD: Allow thresholding interface updates after init (bsc#1190497).\n- x86/mm/cpa: Generalize __set_memory_enc_pgtable() (jsc#SLE-19924).\n- x86/module: Fix the paravirt vs alternative order (bsc#1190497).\n- x86/pm: Save the MSR validity status at context setup (bsc#1190497).\n- x86/ptrace: Fix xfpregs_set() incorrect xmm clearing (bsc#1190497).\n- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1190497).\n- x86/traps: Demand-populate PASID MSR via #GP (jsc#SLE-24350).\n- x86/traps: Mark do_int3() NOKPROBE_SYMBOL (bsc#1190497).\n- x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits (bsc#1190497).\n- x86/unwind: kABI workaround for unwind_state changes (bsc#1193277).\n- x86/unwind: Recover kretprobe trampoline entry (bsc#1193277).\n- xen/blkfront: fix comment for need_copy (git-fixes).\n- xen: fix is_xen_pmu() (git-fixes).\n- xen/netback: avoid entering xenvif_rx_next_skb() with an empty rx queue (bsc#1201381).\n- xen: unexport __init-annotated xen_xlate_map_ballooned_pages() (bsc#1201218).\n- xen/x86: obtain full video frame buffer address for Dom0 also under EFI (bsc#1193556).\n- xen/x86: obtain upper 32 bits of video frame buffer address for Dom0 (bsc#1193556).\n- xfs: drop async cache flushes from CIL commits (bsc#1195669).\n- xhci: Allow host runtime PM as default for Intel Alder Lake N xHCI (git-fixes).\n- xhci: Enable runtime PM on second Alderlake controller (git-fixes).\n- xhci: fix garbage USBSTS being logged in some cases (git-fixes).\n- xhci: fix runtime PM imbalance in USB2 resume (git-fixes).\n- xhci: fix uninitialized string returned by xhci_decode_ctrl_ctx() (git-fixes).\n- xhci: increase usb U3 U0 link resume timeout from 100ms to 500ms (git-fixes).\n- xhci: make xhci_handshake timeout for xhci_reset() adjustable (git-fixes).\n- xhci-pci: Allow host runtime PM as default for Intel Meteor Lake xHCI (git-fixes).\n- xhci-pci: Allow host runtime PM as default for Intel Raptor Lake xHCI (git-fixes).\n- xhci: Prevent futile URB re-submissions due to incorrect return value (git-fixes).\n- xhci: re-initialize the HC during resume if HCE was set (git-fixes).\n- xhci: stop polling roothubs after shutdown (git-fixes).\n- xhci: turn off port power in shutdown (git-fixes).\n- xsk: Do not write NULL in SW ring at allocation failure (jsc#SLE-18375).\n- zsmalloc: decouple class actions from zspage works (bsc#1189998).\n- zsmalloc: introduce obj_allocated (bsc#1189998).\n- zsmalloc: introduce some helper functions (bsc#1189998).\n- zsmalloc: move huge compressed obj from page to zspage (bsc#1189998).\n- zsmalloc: remove zspage isolation for migration (bsc#1189998).\n- zsmalloc: rename zs_stat_type to class_stat_type (bsc#1189998).\n- zsmalloc: replace get_cpu_var with local_lock (bsc#1189998).\n- zsmalloc: replace per zpage lock with poolmigrate_lock (bsc#1189998).\n- zsmalloc: Stop using slab fields in struct page (bsc#1189998 bsc#1190208).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-2520,SUSE-SLE-Module-Basesystem-15-SP4-2022-2520,SUSE-SLE-Module-Development-Tools-15-SP4-2022-2520,SUSE-SLE-Module-Legacy-15-SP4-2022-2520,SUSE-SLE-Module-Live-Patching-15-SP4-2022-2520,SUSE-SLE-Product-HA-15-SP4-2022-2520,SUSE-SLE-Product-WE-15-SP4-2022-2520,openSUSE-SLE-15.4-2022-2520",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2520-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:2520-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222520-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:2520-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1089644",
"url": "https://bugzilla.suse.com/1089644"
},
{
"category": "self",
"summary": "SUSE Bug 1103269",
"url": "https://bugzilla.suse.com/1103269"
},
{
"category": "self",
"summary": "SUSE Bug 1118212",
"url": "https://bugzilla.suse.com/1118212"
},
{
"category": "self",
"summary": "SUSE Bug 1121726",
"url": "https://bugzilla.suse.com/1121726"
},
{
"category": "self",
"summary": "SUSE Bug 1137728",
"url": "https://bugzilla.suse.com/1137728"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1157038",
"url": "https://bugzilla.suse.com/1157038"
},
{
"category": "self",
"summary": "SUSE Bug 1157923",
"url": "https://bugzilla.suse.com/1157923"
},
{
"category": "self",
"summary": "SUSE Bug 1175667",
"url": "https://bugzilla.suse.com/1175667"
},
{
"category": "self",
"summary": "SUSE Bug 1179439",
"url": "https://bugzilla.suse.com/1179439"
},
{
"category": "self",
"summary": "SUSE Bug 1179639",
"url": "https://bugzilla.suse.com/1179639"
},
{
"category": "self",
"summary": "SUSE Bug 1180814",
"url": "https://bugzilla.suse.com/1180814"
},
{
"category": "self",
"summary": "SUSE Bug 1183682",
"url": "https://bugzilla.suse.com/1183682"
},
{
"category": "self",
"summary": "SUSE Bug 1183872",
"url": "https://bugzilla.suse.com/1183872"
},
{
"category": "self",
"summary": "SUSE Bug 1184318",
"url": "https://bugzilla.suse.com/1184318"
},
{
"category": "self",
"summary": "SUSE Bug 1184924",
"url": "https://bugzilla.suse.com/1184924"
},
{
"category": "self",
"summary": "SUSE Bug 1187716",
"url": "https://bugzilla.suse.com/1187716"
},
{
"category": "self",
"summary": "SUSE Bug 1188885",
"url": "https://bugzilla.suse.com/1188885"
},
{
"category": "self",
"summary": "SUSE Bug 1189998",
"url": "https://bugzilla.suse.com/1189998"
},
{
"category": "self",
"summary": "SUSE Bug 1190137",
"url": "https://bugzilla.suse.com/1190137"
},
{
"category": "self",
"summary": "SUSE Bug 1190208",
"url": "https://bugzilla.suse.com/1190208"
},
{
"category": "self",
"summary": "SUSE Bug 1190336",
"url": "https://bugzilla.suse.com/1190336"
},
{
"category": "self",
"summary": "SUSE Bug 1190497",
"url": "https://bugzilla.suse.com/1190497"
},
{
"category": "self",
"summary": "SUSE Bug 1190768",
"url": "https://bugzilla.suse.com/1190768"
},
{
"category": "self",
"summary": "SUSE Bug 1190786",
"url": "https://bugzilla.suse.com/1190786"
},
{
"category": "self",
"summary": "SUSE Bug 1190812",
"url": "https://bugzilla.suse.com/1190812"
},
{
"category": "self",
"summary": "SUSE Bug 1191271",
"url": "https://bugzilla.suse.com/1191271"
},
{
"category": "self",
"summary": "SUSE Bug 1191663",
"url": "https://bugzilla.suse.com/1191663"
},
{
"category": "self",
"summary": "SUSE Bug 1192483",
"url": "https://bugzilla.suse.com/1192483"
},
{
"category": "self",
"summary": "SUSE Bug 1193064",
"url": "https://bugzilla.suse.com/1193064"
},
{
"category": "self",
"summary": "SUSE Bug 1193277",
"url": "https://bugzilla.suse.com/1193277"
},
{
"category": "self",
"summary": "SUSE Bug 1193289",
"url": "https://bugzilla.suse.com/1193289"
},
{
"category": "self",
"summary": "SUSE Bug 1193431",
"url": "https://bugzilla.suse.com/1193431"
},
{
"category": "self",
"summary": "SUSE Bug 1193556",
"url": "https://bugzilla.suse.com/1193556"
},
{
"category": "self",
"summary": "SUSE Bug 1193629",
"url": "https://bugzilla.suse.com/1193629"
},
{
"category": "self",
"summary": "SUSE Bug 1193640",
"url": "https://bugzilla.suse.com/1193640"
},
{
"category": "self",
"summary": "SUSE Bug 1193787",
"url": "https://bugzilla.suse.com/1193787"
},
{
"category": "self",
"summary": "SUSE Bug 1193823",
"url": "https://bugzilla.suse.com/1193823"
},
{
"category": "self",
"summary": "SUSE Bug 1193852",
"url": "https://bugzilla.suse.com/1193852"
},
{
"category": "self",
"summary": "SUSE Bug 1194086",
"url": "https://bugzilla.suse.com/1194086"
},
{
"category": "self",
"summary": "SUSE Bug 1194111",
"url": "https://bugzilla.suse.com/1194111"
},
{
"category": "self",
"summary": "SUSE Bug 1194191",
"url": "https://bugzilla.suse.com/1194191"
},
{
"category": "self",
"summary": "SUSE Bug 1194409",
"url": "https://bugzilla.suse.com/1194409"
},
{
"category": "self",
"summary": "SUSE Bug 1194501",
"url": "https://bugzilla.suse.com/1194501"
},
{
"category": "self",
"summary": "SUSE Bug 1194523",
"url": "https://bugzilla.suse.com/1194523"
},
{
"category": "self",
"summary": "SUSE Bug 1194526",
"url": "https://bugzilla.suse.com/1194526"
},
{
"category": "self",
"summary": "SUSE Bug 1194583",
"url": "https://bugzilla.suse.com/1194583"
},
{
"category": "self",
"summary": "SUSE Bug 1194585",
"url": "https://bugzilla.suse.com/1194585"
},
{
"category": "self",
"summary": "SUSE Bug 1194586",
"url": "https://bugzilla.suse.com/1194586"
},
{
"category": "self",
"summary": "SUSE Bug 1194625",
"url": "https://bugzilla.suse.com/1194625"
},
{
"category": "self",
"summary": "SUSE Bug 1194765",
"url": "https://bugzilla.suse.com/1194765"
},
{
"category": "self",
"summary": "SUSE Bug 1194826",
"url": "https://bugzilla.suse.com/1194826"
},
{
"category": "self",
"summary": "SUSE Bug 1194869",
"url": "https://bugzilla.suse.com/1194869"
},
{
"category": "self",
"summary": "SUSE Bug 1195099",
"url": "https://bugzilla.suse.com/1195099"
},
{
"category": "self",
"summary": "SUSE Bug 1195287",
"url": "https://bugzilla.suse.com/1195287"
},
{
"category": "self",
"summary": "SUSE Bug 1195478",
"url": "https://bugzilla.suse.com/1195478"
},
{
"category": "self",
"summary": "SUSE Bug 1195482",
"url": "https://bugzilla.suse.com/1195482"
},
{
"category": "self",
"summary": "SUSE Bug 1195504",
"url": "https://bugzilla.suse.com/1195504"
},
{
"category": "self",
"summary": "SUSE Bug 1195651",
"url": "https://bugzilla.suse.com/1195651"
},
{
"category": "self",
"summary": "SUSE Bug 1195668",
"url": "https://bugzilla.suse.com/1195668"
},
{
"category": "self",
"summary": "SUSE Bug 1195669",
"url": "https://bugzilla.suse.com/1195669"
},
{
"category": "self",
"summary": "SUSE Bug 1195775",
"url": "https://bugzilla.suse.com/1195775"
},
{
"category": "self",
"summary": "SUSE Bug 1195823",
"url": "https://bugzilla.suse.com/1195823"
},
{
"category": "self",
"summary": "SUSE Bug 1195826",
"url": "https://bugzilla.suse.com/1195826"
},
{
"category": "self",
"summary": "SUSE Bug 1195913",
"url": "https://bugzilla.suse.com/1195913"
},
{
"category": "self",
"summary": "SUSE Bug 1195915",
"url": "https://bugzilla.suse.com/1195915"
},
{
"category": "self",
"summary": "SUSE Bug 1195926",
"url": "https://bugzilla.suse.com/1195926"
},
{
"category": "self",
"summary": "SUSE Bug 1195944",
"url": "https://bugzilla.suse.com/1195944"
},
{
"category": "self",
"summary": "SUSE Bug 1195957",
"url": "https://bugzilla.suse.com/1195957"
},
{
"category": "self",
"summary": "SUSE Bug 1195987",
"url": "https://bugzilla.suse.com/1195987"
},
{
"category": "self",
"summary": "SUSE Bug 1196079",
"url": "https://bugzilla.suse.com/1196079"
},
{
"category": "self",
"summary": "SUSE Bug 1196114",
"url": "https://bugzilla.suse.com/1196114"
},
{
"category": "self",
"summary": "SUSE Bug 1196130",
"url": "https://bugzilla.suse.com/1196130"
},
{
"category": "self",
"summary": "SUSE Bug 1196213",
"url": "https://bugzilla.suse.com/1196213"
},
{
"category": "self",
"summary": "SUSE Bug 1196306",
"url": "https://bugzilla.suse.com/1196306"
},
{
"category": "self",
"summary": "SUSE Bug 1196367",
"url": "https://bugzilla.suse.com/1196367"
},
{
"category": "self",
"summary": "SUSE Bug 1196400",
"url": "https://bugzilla.suse.com/1196400"
},
{
"category": "self",
"summary": "SUSE Bug 1196426",
"url": "https://bugzilla.suse.com/1196426"
},
{
"category": "self",
"summary": "SUSE Bug 1196478",
"url": "https://bugzilla.suse.com/1196478"
},
{
"category": "self",
"summary": "SUSE Bug 1196514",
"url": "https://bugzilla.suse.com/1196514"
},
{
"category": "self",
"summary": "SUSE Bug 1196570",
"url": "https://bugzilla.suse.com/1196570"
},
{
"category": "self",
"summary": "SUSE Bug 1196723",
"url": "https://bugzilla.suse.com/1196723"
},
{
"category": "self",
"summary": "SUSE Bug 1196779",
"url": "https://bugzilla.suse.com/1196779"
},
{
"category": "self",
"summary": "SUSE Bug 1196830",
"url": "https://bugzilla.suse.com/1196830"
},
{
"category": "self",
"summary": "SUSE Bug 1196836",
"url": "https://bugzilla.suse.com/1196836"
},
{
"category": "self",
"summary": "SUSE Bug 1196866",
"url": "https://bugzilla.suse.com/1196866"
},
{
"category": "self",
"summary": "SUSE Bug 1196868",
"url": "https://bugzilla.suse.com/1196868"
},
{
"category": "self",
"summary": "SUSE Bug 1196869",
"url": "https://bugzilla.suse.com/1196869"
},
{
"category": "self",
"summary": "SUSE Bug 1196901",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "self",
"summary": "SUSE Bug 1196930",
"url": "https://bugzilla.suse.com/1196930"
},
{
"category": "self",
"summary": "SUSE Bug 1196942",
"url": "https://bugzilla.suse.com/1196942"
},
{
"category": "self",
"summary": "SUSE Bug 1196960",
"url": "https://bugzilla.suse.com/1196960"
},
{
"category": "self",
"summary": "SUSE Bug 1197016",
"url": "https://bugzilla.suse.com/1197016"
},
{
"category": "self",
"summary": "SUSE Bug 1197157",
"url": "https://bugzilla.suse.com/1197157"
},
{
"category": "self",
"summary": "SUSE Bug 1197227",
"url": "https://bugzilla.suse.com/1197227"
},
{
"category": "self",
"summary": "SUSE Bug 1197243",
"url": "https://bugzilla.suse.com/1197243"
},
{
"category": "self",
"summary": "SUSE Bug 1197292",
"url": "https://bugzilla.suse.com/1197292"
},
{
"category": "self",
"summary": "SUSE Bug 1197302",
"url": "https://bugzilla.suse.com/1197302"
},
{
"category": "self",
"summary": "SUSE Bug 1197303",
"url": "https://bugzilla.suse.com/1197303"
},
{
"category": "self",
"summary": "SUSE Bug 1197304",
"url": "https://bugzilla.suse.com/1197304"
},
{
"category": "self",
"summary": "SUSE Bug 1197362",
"url": "https://bugzilla.suse.com/1197362"
},
{
"category": "self",
"summary": "SUSE Bug 1197386",
"url": "https://bugzilla.suse.com/1197386"
},
{
"category": "self",
"summary": "SUSE Bug 1197501",
"url": "https://bugzilla.suse.com/1197501"
},
{
"category": "self",
"summary": "SUSE Bug 1197601",
"url": "https://bugzilla.suse.com/1197601"
},
{
"category": "self",
"summary": "SUSE Bug 1197661",
"url": "https://bugzilla.suse.com/1197661"
},
{
"category": "self",
"summary": "SUSE Bug 1197675",
"url": "https://bugzilla.suse.com/1197675"
},
{
"category": "self",
"summary": "SUSE Bug 1197761",
"url": "https://bugzilla.suse.com/1197761"
},
{
"category": "self",
"summary": "SUSE Bug 1197817",
"url": "https://bugzilla.suse.com/1197817"
},
{
"category": "self",
"summary": "SUSE Bug 1197819",
"url": "https://bugzilla.suse.com/1197819"
},
{
"category": "self",
"summary": "SUSE Bug 1197820",
"url": "https://bugzilla.suse.com/1197820"
},
{
"category": "self",
"summary": "SUSE Bug 1197888",
"url": "https://bugzilla.suse.com/1197888"
},
{
"category": "self",
"summary": "SUSE Bug 1197889",
"url": "https://bugzilla.suse.com/1197889"
},
{
"category": "self",
"summary": "SUSE Bug 1197894",
"url": "https://bugzilla.suse.com/1197894"
},
{
"category": "self",
"summary": "SUSE Bug 1197915",
"url": "https://bugzilla.suse.com/1197915"
},
{
"category": "self",
"summary": "SUSE Bug 1197917",
"url": "https://bugzilla.suse.com/1197917"
},
{
"category": "self",
"summary": "SUSE Bug 1197918",
"url": "https://bugzilla.suse.com/1197918"
},
{
"category": "self",
"summary": "SUSE Bug 1197920",
"url": "https://bugzilla.suse.com/1197920"
},
{
"category": "self",
"summary": "SUSE Bug 1197921",
"url": "https://bugzilla.suse.com/1197921"
},
{
"category": "self",
"summary": "SUSE Bug 1197922",
"url": "https://bugzilla.suse.com/1197922"
},
{
"category": "self",
"summary": "SUSE Bug 1197926",
"url": "https://bugzilla.suse.com/1197926"
},
{
"category": "self",
"summary": "SUSE Bug 1198009",
"url": "https://bugzilla.suse.com/1198009"
},
{
"category": "self",
"summary": "SUSE Bug 1198010",
"url": "https://bugzilla.suse.com/1198010"
},
{
"category": "self",
"summary": "SUSE Bug 1198012",
"url": "https://bugzilla.suse.com/1198012"
},
{
"category": "self",
"summary": "SUSE Bug 1198013",
"url": "https://bugzilla.suse.com/1198013"
},
{
"category": "self",
"summary": "SUSE Bug 1198014",
"url": "https://bugzilla.suse.com/1198014"
},
{
"category": "self",
"summary": "SUSE Bug 1198015",
"url": "https://bugzilla.suse.com/1198015"
},
{
"category": "self",
"summary": "SUSE Bug 1198016",
"url": "https://bugzilla.suse.com/1198016"
},
{
"category": "self",
"summary": "SUSE Bug 1198017",
"url": "https://bugzilla.suse.com/1198017"
},
{
"category": "self",
"summary": "SUSE Bug 1198018",
"url": "https://bugzilla.suse.com/1198018"
},
{
"category": "self",
"summary": "SUSE Bug 1198019",
"url": "https://bugzilla.suse.com/1198019"
},
{
"category": "self",
"summary": "SUSE Bug 1198020",
"url": "https://bugzilla.suse.com/1198020"
},
{
"category": "self",
"summary": "SUSE Bug 1198021",
"url": "https://bugzilla.suse.com/1198021"
},
{
"category": "self",
"summary": "SUSE Bug 1198022",
"url": "https://bugzilla.suse.com/1198022"
},
{
"category": "self",
"summary": "SUSE Bug 1198023",
"url": "https://bugzilla.suse.com/1198023"
},
{
"category": "self",
"summary": "SUSE Bug 1198024",
"url": "https://bugzilla.suse.com/1198024"
},
{
"category": "self",
"summary": "SUSE Bug 1198027",
"url": "https://bugzilla.suse.com/1198027"
},
{
"category": "self",
"summary": "SUSE Bug 1198030",
"url": "https://bugzilla.suse.com/1198030"
},
{
"category": "self",
"summary": "SUSE Bug 1198034",
"url": "https://bugzilla.suse.com/1198034"
},
{
"category": "self",
"summary": "SUSE Bug 1198058",
"url": "https://bugzilla.suse.com/1198058"
},
{
"category": "self",
"summary": "SUSE Bug 1198217",
"url": "https://bugzilla.suse.com/1198217"
},
{
"category": "self",
"summary": "SUSE Bug 1198379",
"url": "https://bugzilla.suse.com/1198379"
},
{
"category": "self",
"summary": "SUSE Bug 1198400",
"url": "https://bugzilla.suse.com/1198400"
},
{
"category": "self",
"summary": "SUSE Bug 1198402",
"url": "https://bugzilla.suse.com/1198402"
},
{
"category": "self",
"summary": "SUSE Bug 1198410",
"url": "https://bugzilla.suse.com/1198410"
},
{
"category": "self",
"summary": "SUSE Bug 1198412",
"url": "https://bugzilla.suse.com/1198412"
},
{
"category": "self",
"summary": "SUSE Bug 1198413",
"url": "https://bugzilla.suse.com/1198413"
},
{
"category": "self",
"summary": "SUSE Bug 1198438",
"url": "https://bugzilla.suse.com/1198438"
},
{
"category": "self",
"summary": "SUSE Bug 1198484",
"url": "https://bugzilla.suse.com/1198484"
},
{
"category": "self",
"summary": "SUSE Bug 1198577",
"url": "https://bugzilla.suse.com/1198577"
},
{
"category": "self",
"summary": "SUSE Bug 1198585",
"url": "https://bugzilla.suse.com/1198585"
},
{
"category": "self",
"summary": "SUSE Bug 1198660",
"url": "https://bugzilla.suse.com/1198660"
},
{
"category": "self",
"summary": "SUSE Bug 1198802",
"url": "https://bugzilla.suse.com/1198802"
},
{
"category": "self",
"summary": "SUSE Bug 1198803",
"url": "https://bugzilla.suse.com/1198803"
},
{
"category": "self",
"summary": "SUSE Bug 1198806",
"url": "https://bugzilla.suse.com/1198806"
},
{
"category": "self",
"summary": "SUSE Bug 1198811",
"url": "https://bugzilla.suse.com/1198811"
},
{
"category": "self",
"summary": "SUSE Bug 1198826",
"url": "https://bugzilla.suse.com/1198826"
},
{
"category": "self",
"summary": "SUSE Bug 1198829",
"url": "https://bugzilla.suse.com/1198829"
},
{
"category": "self",
"summary": "SUSE Bug 1198835",
"url": "https://bugzilla.suse.com/1198835"
},
{
"category": "self",
"summary": "SUSE Bug 1198968",
"url": "https://bugzilla.suse.com/1198968"
},
{
"category": "self",
"summary": "SUSE Bug 1198971",
"url": "https://bugzilla.suse.com/1198971"
},
{
"category": "self",
"summary": "SUSE Bug 1199011",
"url": "https://bugzilla.suse.com/1199011"
},
{
"category": "self",
"summary": "SUSE Bug 1199024",
"url": "https://bugzilla.suse.com/1199024"
},
{
"category": "self",
"summary": "SUSE Bug 1199035",
"url": "https://bugzilla.suse.com/1199035"
},
{
"category": "self",
"summary": "SUSE Bug 1199046",
"url": "https://bugzilla.suse.com/1199046"
},
{
"category": "self",
"summary": "SUSE Bug 1199052",
"url": "https://bugzilla.suse.com/1199052"
},
{
"category": "self",
"summary": "SUSE Bug 1199063",
"url": "https://bugzilla.suse.com/1199063"
},
{
"category": "self",
"summary": "SUSE Bug 1199163",
"url": "https://bugzilla.suse.com/1199163"
},
{
"category": "self",
"summary": "SUSE Bug 1199173",
"url": "https://bugzilla.suse.com/1199173"
},
{
"category": "self",
"summary": "SUSE Bug 1199260",
"url": "https://bugzilla.suse.com/1199260"
},
{
"category": "self",
"summary": "SUSE Bug 1199314",
"url": "https://bugzilla.suse.com/1199314"
},
{
"category": "self",
"summary": "SUSE Bug 1199390",
"url": "https://bugzilla.suse.com/1199390"
},
{
"category": "self",
"summary": "SUSE Bug 1199426",
"url": "https://bugzilla.suse.com/1199426"
},
{
"category": "self",
"summary": "SUSE Bug 1199433",
"url": "https://bugzilla.suse.com/1199433"
},
{
"category": "self",
"summary": "SUSE Bug 1199439",
"url": "https://bugzilla.suse.com/1199439"
},
{
"category": "self",
"summary": "SUSE Bug 1199482",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "self",
"summary": "SUSE Bug 1199487",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "self",
"summary": "SUSE Bug 1199505",
"url": "https://bugzilla.suse.com/1199505"
},
{
"category": "self",
"summary": "SUSE Bug 1199507",
"url": "https://bugzilla.suse.com/1199507"
},
{
"category": "self",
"summary": "SUSE Bug 1199605",
"url": "https://bugzilla.suse.com/1199605"
},
{
"category": "self",
"summary": "SUSE Bug 1199611",
"url": "https://bugzilla.suse.com/1199611"
},
{
"category": "self",
"summary": "SUSE Bug 1199626",
"url": "https://bugzilla.suse.com/1199626"
},
{
"category": "self",
"summary": "SUSE Bug 1199631",
"url": "https://bugzilla.suse.com/1199631"
},
{
"category": "self",
"summary": "SUSE Bug 1199650",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "self",
"summary": "SUSE Bug 1199657",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "self",
"summary": "SUSE Bug 1199674",
"url": "https://bugzilla.suse.com/1199674"
},
{
"category": "self",
"summary": "SUSE Bug 1199736",
"url": "https://bugzilla.suse.com/1199736"
},
{
"category": "self",
"summary": "SUSE Bug 1199793",
"url": "https://bugzilla.suse.com/1199793"
},
{
"category": "self",
"summary": "SUSE Bug 1199839",
"url": "https://bugzilla.suse.com/1199839"
},
{
"category": "self",
"summary": "SUSE Bug 1199875",
"url": "https://bugzilla.suse.com/1199875"
},
{
"category": "self",
"summary": "SUSE Bug 1199909",
"url": "https://bugzilla.suse.com/1199909"
},
{
"category": "self",
"summary": "SUSE Bug 1200015",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "self",
"summary": "SUSE Bug 1200019",
"url": "https://bugzilla.suse.com/1200019"
},
{
"category": "self",
"summary": "SUSE Bug 1200045",
"url": "https://bugzilla.suse.com/1200045"
},
{
"category": "self",
"summary": "SUSE Bug 1200046",
"url": "https://bugzilla.suse.com/1200046"
},
{
"category": "self",
"summary": "SUSE Bug 1200144",
"url": "https://bugzilla.suse.com/1200144"
},
{
"category": "self",
"summary": "SUSE Bug 1200205",
"url": "https://bugzilla.suse.com/1200205"
},
{
"category": "self",
"summary": "SUSE Bug 1200211",
"url": "https://bugzilla.suse.com/1200211"
},
{
"category": "self",
"summary": "SUSE Bug 1200259",
"url": "https://bugzilla.suse.com/1200259"
},
{
"category": "self",
"summary": "SUSE Bug 1200263",
"url": "https://bugzilla.suse.com/1200263"
},
{
"category": "self",
"summary": "SUSE Bug 1200284",
"url": "https://bugzilla.suse.com/1200284"
},
{
"category": "self",
"summary": "SUSE Bug 1200315",
"url": "https://bugzilla.suse.com/1200315"
},
{
"category": "self",
"summary": "SUSE Bug 1200343",
"url": "https://bugzilla.suse.com/1200343"
},
{
"category": "self",
"summary": "SUSE Bug 1200420",
"url": "https://bugzilla.suse.com/1200420"
},
{
"category": "self",
"summary": "SUSE Bug 1200442",
"url": "https://bugzilla.suse.com/1200442"
},
{
"category": "self",
"summary": "SUSE Bug 1200475",
"url": "https://bugzilla.suse.com/1200475"
},
{
"category": "self",
"summary": "SUSE Bug 1200502",
"url": "https://bugzilla.suse.com/1200502"
},
{
"category": "self",
"summary": "SUSE Bug 1200567",
"url": "https://bugzilla.suse.com/1200567"
},
{
"category": "self",
"summary": "SUSE Bug 1200569",
"url": "https://bugzilla.suse.com/1200569"
},
{
"category": "self",
"summary": "SUSE Bug 1200571",
"url": "https://bugzilla.suse.com/1200571"
},
{
"category": "self",
"summary": "SUSE Bug 1200599",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "self",
"summary": "SUSE Bug 1200600",
"url": "https://bugzilla.suse.com/1200600"
},
{
"category": "self",
"summary": "SUSE Bug 1200608",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "self",
"summary": "SUSE Bug 1200611",
"url": "https://bugzilla.suse.com/1200611"
},
{
"category": "self",
"summary": "SUSE Bug 1200619",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "self",
"summary": "SUSE Bug 1200692",
"url": "https://bugzilla.suse.com/1200692"
},
{
"category": "self",
"summary": "SUSE Bug 1200762",
"url": "https://bugzilla.suse.com/1200762"
},
{
"category": "self",
"summary": "SUSE Bug 1200763",
"url": "https://bugzilla.suse.com/1200763"
},
{
"category": "self",
"summary": "SUSE Bug 1200806",
"url": "https://bugzilla.suse.com/1200806"
},
{
"category": "self",
"summary": "SUSE Bug 1200807",
"url": "https://bugzilla.suse.com/1200807"
},
{
"category": "self",
"summary": "SUSE Bug 1200808",
"url": "https://bugzilla.suse.com/1200808"
},
{
"category": "self",
"summary": "SUSE Bug 1200809",
"url": "https://bugzilla.suse.com/1200809"
},
{
"category": "self",
"summary": "SUSE Bug 1200810",
"url": "https://bugzilla.suse.com/1200810"
},
{
"category": "self",
"summary": "SUSE Bug 1200812",
"url": "https://bugzilla.suse.com/1200812"
},
{
"category": "self",
"summary": "SUSE Bug 1200813",
"url": "https://bugzilla.suse.com/1200813"
},
{
"category": "self",
"summary": "SUSE Bug 1200815",
"url": "https://bugzilla.suse.com/1200815"
},
{
"category": "self",
"summary": "SUSE Bug 1200816",
"url": "https://bugzilla.suse.com/1200816"
},
{
"category": "self",
"summary": "SUSE Bug 1200820",
"url": "https://bugzilla.suse.com/1200820"
},
{
"category": "self",
"summary": "SUSE Bug 1200821",
"url": "https://bugzilla.suse.com/1200821"
},
{
"category": "self",
"summary": "SUSE Bug 1200822",
"url": "https://bugzilla.suse.com/1200822"
},
{
"category": "self",
"summary": "SUSE Bug 1200824",
"url": "https://bugzilla.suse.com/1200824"
},
{
"category": "self",
"summary": "SUSE Bug 1200825",
"url": "https://bugzilla.suse.com/1200825"
},
{
"category": "self",
"summary": "SUSE Bug 1200827",
"url": "https://bugzilla.suse.com/1200827"
},
{
"category": "self",
"summary": "SUSE Bug 1200828",
"url": "https://bugzilla.suse.com/1200828"
},
{
"category": "self",
"summary": "SUSE Bug 1200829",
"url": "https://bugzilla.suse.com/1200829"
},
{
"category": "self",
"summary": "SUSE Bug 1200830",
"url": "https://bugzilla.suse.com/1200830"
},
{
"category": "self",
"summary": "SUSE Bug 1200845",
"url": "https://bugzilla.suse.com/1200845"
},
{
"category": "self",
"summary": "SUSE Bug 1200882",
"url": "https://bugzilla.suse.com/1200882"
},
{
"category": "self",
"summary": "SUSE Bug 1200925",
"url": "https://bugzilla.suse.com/1200925"
},
{
"category": "self",
"summary": "SUSE Bug 1201050",
"url": "https://bugzilla.suse.com/1201050"
},
{
"category": "self",
"summary": "SUSE Bug 1201080",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "self",
"summary": "SUSE Bug 1201160",
"url": "https://bugzilla.suse.com/1201160"
},
{
"category": "self",
"summary": "SUSE Bug 1201171",
"url": "https://bugzilla.suse.com/1201171"
},
{
"category": "self",
"summary": "SUSE Bug 1201177",
"url": "https://bugzilla.suse.com/1201177"
},
{
"category": "self",
"summary": "SUSE Bug 1201193",
"url": "https://bugzilla.suse.com/1201193"
},
{
"category": "self",
"summary": "SUSE Bug 1201196",
"url": "https://bugzilla.suse.com/1201196"
},
{
"category": "self",
"summary": "SUSE Bug 1201218",
"url": "https://bugzilla.suse.com/1201218"
},
{
"category": "self",
"summary": "SUSE Bug 1201222",
"url": "https://bugzilla.suse.com/1201222"
},
{
"category": "self",
"summary": "SUSE Bug 1201228",
"url": "https://bugzilla.suse.com/1201228"
},
{
"category": "self",
"summary": "SUSE Bug 1201251",
"url": "https://bugzilla.suse.com/1201251"
},
{
"category": "self",
"summary": "SUSE Bug 1201381",
"url": "https://bugzilla.suse.com/1201381"
},
{
"category": "self",
"summary": "SUSE Bug 1201471",
"url": "https://bugzilla.suse.com/1201471"
},
{
"category": "self",
"summary": "SUSE Bug 1201524",
"url": "https://bugzilla.suse.com/1201524"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26341 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26341/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33061 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4204 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-44879 page",
"url": "https://www.suse.com/security/cve/CVE-2021-44879/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45402 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45402/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0264 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0494 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0494/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0617 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1012 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1016 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1184 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1184/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1198 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1205 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1462 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1462/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1508 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1508/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1651 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1651/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1652 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1652/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1671 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1671/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1679 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1729 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1734 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1734/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1789 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1852 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1852/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1966 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1972 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1972/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1974 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1998 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20132 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20154 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21123 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21125 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21127 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21166 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21180 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21499 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21499/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2318 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23222 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26365 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26365/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-26490 page",
"url": "https://www.suse.com/security/cve/CVE-2022-26490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29582 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29582/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29900 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29901 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-30594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-30594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33740 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33741 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33742 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33743 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33981 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-34918 page",
"url": "https://www.suse.com/security/cve/CVE-2022-34918/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-07-21T16:35:09Z",
"generator": {
"date": "2022-07-21T16:35:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:2520-1",
"initial_release_date": "2022-07-21T16:35:09Z",
"revision_history": [
{
"date": "2022-07-21T16:35:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"product_id": "dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"product_id": "dlm-kmp-default-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-allwinner-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-altera-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-altera-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-amazon-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-amd-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-amd-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-amlogic-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-apm-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-apm-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-apple-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-apple-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-arm-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-arm-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-broadcom-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-cavium-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-exynos-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-freescale-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-hisilicon-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-lg-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-lg-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-marvell-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-mediatek-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-nvidia-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-qcom-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-renesas-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-rockchip-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-socionext-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-sprd-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"product_id": "dtb-xilinx-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-64kb-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-default-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-default-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"product_id": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-default-devel-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-default-extra-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-default-optional-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-obs-build-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-obs-qa-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kernel-syms-5.14.21-150400.24.11.1.aarch64",
"product_id": "kernel-syms-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.14.21-150400.24.11.1.noarch",
"product": {
"name": "kernel-devel-5.14.21-150400.24.11.1.noarch",
"product_id": "kernel-devel-5.14.21-150400.24.11.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.14.21-150400.24.11.1.noarch",
"product": {
"name": "kernel-docs-5.14.21-150400.24.11.1.noarch",
"product_id": "kernel-docs-5.14.21-150400.24.11.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"product": {
"name": "kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"product_id": "kernel-docs-html-5.14.21-150400.24.11.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.14.21-150400.24.11.1.noarch",
"product": {
"name": "kernel-macros-5.14.21-150400.24.11.1.noarch",
"product_id": "kernel-macros-5.14.21-150400.24.11.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.14.21-150400.24.11.1.noarch",
"product": {
"name": "kernel-source-5.14.21-150400.24.11.1.noarch",
"product_id": "kernel-source-5.14.21-150400.24.11.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"product_id": "kernel-source-vanilla-5.14.21-150400.24.11.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"product_id": "dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kernel-debug-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kernel-default-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kernel-default-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"product_id": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kernel-default-devel-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kernel-default-extra-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kernel-default-optional-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"product_id": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kernel-obs-build-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kernel-syms-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"product_id": "dlm-kmp-default-5.14.21-150400.24.11.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "kernel-default-5.14.21-150400.24.11.1.s390x",
"product_id": "kernel-default-5.14.21-150400.24.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"product_id": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"product_id": "kernel-default-devel-5.14.21-150400.24.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"product_id": "kernel-default-extra-5.14.21-150400.24.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"product_id": "kernel-default-optional-5.14.21-150400.24.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"product_id": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"product_id": "kernel-obs-build-5.14.21-150400.24.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"product_id": "kernel-obs-qa-5.14.21-150400.24.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "kernel-syms-5.14.21-150400.24.11.1.s390x",
"product_id": "kernel-syms-5.14.21-150400.24.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"product_id": "kernel-zfcpdump-5.14.21-150400.24.11.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.11.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"product_id": "cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"product_id": "dlm-kmp-default-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"product_id": "gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kernel-debug-5.14.21-150400.24.11.1.x86_64",
"product_id": "kernel-debug-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"product_id": "kernel-debug-devel-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kernel-default-5.14.21-150400.24.11.1.x86_64",
"product_id": "kernel-default-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"product": {
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"product_id": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"product_id": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"product_id": "kernel-default-devel-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"product_id": "kernel-default-extra-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"product_id": "kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"product_id": "kernel-default-optional-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"product_id": "kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"product": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"product_id": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"product_id": "kernel-obs-build-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"product_id": "kernel-obs-qa-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kernel-syms-5.14.21-150400.24.11.1.x86_64",
"product_id": "kernel-syms-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"product_id": "kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"product_id": "ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"product_id": "reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-default-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-default-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-default-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150400.24.11.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150400.24.11.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150400.24.11.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150400.24.11.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.14.21-150400.24.11.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch"
},
"product_reference": "kernel-docs-5.14.21-150400.24.11.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150400.24.11.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150400.24.11.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-syms-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64"
},
"product_reference": "kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150400.24.11.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-altera-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amazon-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-amd-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-apm-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apple-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-apple-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-arm-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-lg-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-debug-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-default-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-default-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-default-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-default-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64"
},
"product_reference": "kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64"
},
"product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x"
},
"product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.14.21-150400.24.11.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch"
},
"product_reference": "kernel-devel-5.14.21-150400.24.11.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.14.21-150400.24.11.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch"
},
"product_reference": "kernel-docs-5.14.21-150400.24.11.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.14.21-150400.24.11.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch"
},
"product_reference": "kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.14.21-150400.24.11.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch"
},
"product_reference": "kernel-macros-5.14.21-150400.24.11.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.14.21-150400.24.11.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch"
},
"product_reference": "kernel-source-5.14.21-150400.24.11.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.14.21-150400.24.11.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-syms-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kernel-syms-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-26341",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26341"
}
],
"notes": [
{
"category": "general",
"text": "Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26341",
"url": "https://www.suse.com/security/cve/CVE-2021-26341"
},
{
"category": "external",
"summary": "SUSE Bug 1196901 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "external",
"summary": "SUSE Bug 1201050 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1201050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-33061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33061"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33061",
"url": "https://www.suse.com/security/cve/CVE-2021-33061"
},
{
"category": "external",
"summary": "SUSE Bug 1196426 for CVE-2021-33061",
"url": "https://bugzilla.suse.com/1196426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2021-33061"
},
{
"cve": "CVE-2021-4204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4204"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory access flaw was found in the Linux kernel\u0027s eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4204",
"url": "https://www.suse.com/security/cve/CVE-2021-4204"
},
{
"category": "external",
"summary": "SUSE Bug 1194111 for CVE-2021-4204",
"url": "https://bugzilla.suse.com/1194111"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2021-4204"
},
{
"cve": "CVE-2021-44879",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-44879"
}
],
"notes": [
{
"category": "general",
"text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-44879",
"url": "https://www.suse.com/security/cve/CVE-2021-44879"
},
{
"category": "external",
"summary": "SUSE Bug 1195987 for CVE-2021-44879",
"url": "https://bugzilla.suse.com/1195987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2021-44879"
},
{
"cve": "CVE-2021-45402",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45402"
}
],
"notes": [
{
"category": "general",
"text": "The check_alu_op() function in kernel/bpf/verifier.c in the Linux kernel through v5.16-rc5 did not properly update bounds while handling the mov32 instruction, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45402",
"url": "https://www.suse.com/security/cve/CVE-2021-45402"
},
{
"category": "external",
"summary": "SUSE Bug 1196130 for CVE-2021-45402",
"url": "https://bugzilla.suse.com/1196130"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2021-45402"
},
{
"cve": "CVE-2022-0264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0264"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the Linux kernel\u0027s eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions \u003c v5.16-rc6",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0264",
"url": "https://www.suse.com/security/cve/CVE-2022-0264"
},
{
"category": "external",
"summary": "SUSE Bug 1194826 for CVE-2022-0264",
"url": "https://bugzilla.suse.com/1194826"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-0264"
},
{
"cve": "CVE-2022-0494",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0494"
}
],
"notes": [
{
"category": "general",
"text": "A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0494",
"url": "https://www.suse.com/security/cve/CVE-2022-0494"
},
{
"category": "external",
"summary": "SUSE Bug 1197386 for CVE-2022-0494",
"url": "https://bugzilla.suse.com/1197386"
},
{
"category": "external",
"summary": "SUSE Bug 1207783 for CVE-2022-0494",
"url": "https://bugzilla.suse.com/1207783"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-0494"
},
{
"cve": "CVE-2022-0617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0617"
}
],
"notes": [
{
"category": "general",
"text": "A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0617",
"url": "https://www.suse.com/security/cve/CVE-2022-0617"
},
{
"category": "external",
"summary": "SUSE Bug 1196079 for CVE-2022-0617",
"url": "https://bugzilla.suse.com/1196079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-0617"
},
{
"cve": "CVE-2022-1012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1012"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1012",
"url": "https://www.suse.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "SUSE Bug 1199482 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "external",
"summary": "SUSE Bug 1199694 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199694"
},
{
"category": "external",
"summary": "SUSE Bug 1202335 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1202335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-1016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1016"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle \u0027return\u0027 with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1016",
"url": "https://www.suse.com/security/cve/CVE-2022-1016"
},
{
"category": "external",
"summary": "SUSE Bug 1197335 for CVE-2022-1016",
"url": "https://bugzilla.suse.com/1197335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "important"
}
],
"title": "CVE-2022-1016"
},
{
"cve": "CVE-2022-1184",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1184"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u0027s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1184",
"url": "https://www.suse.com/security/cve/CVE-2022-1184"
},
{
"category": "external",
"summary": "SUSE Bug 1198577 for CVE-2022-1184",
"url": "https://bugzilla.suse.com/1198577"
},
{
"category": "external",
"summary": "SUSE Bug 1210859 for CVE-2022-1184",
"url": "https://bugzilla.suse.com/1210859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1198"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1198",
"url": "https://www.suse.com/security/cve/CVE-2022-1198"
},
{
"category": "external",
"summary": "SUSE Bug 1198030 for CVE-2022-1198",
"url": "https://bugzilla.suse.com/1198030"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-1198"
},
{
"cve": "CVE-2022-1205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1205"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1205",
"url": "https://www.suse.com/security/cve/CVE-2022-1205"
},
{
"category": "external",
"summary": "SUSE Bug 1198027 for CVE-2022-1205",
"url": "https://bugzilla.suse.com/1198027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-1205"
},
{
"cve": "CVE-2022-1462",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1462"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1462",
"url": "https://www.suse.com/security/cve/CVE-2022-1462"
},
{
"category": "external",
"summary": "SUSE Bug 1198829 for CVE-2022-1462",
"url": "https://bugzilla.suse.com/1198829"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1508",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1508"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1508",
"url": "https://www.suse.com/security/cve/CVE-2022-1508"
},
{
"category": "external",
"summary": "SUSE Bug 1198968 for CVE-2022-1508",
"url": "https://bugzilla.suse.com/1198968"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-1508"
},
{
"cve": "CVE-2022-1651",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1651"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in the Linux kernel in acrn_dev_ioctl in the drivers/virt/acrn/hsm.c function in how the ACRN Device Model emulates virtual NICs in VM. This flaw allows a local privileged attacker to leak unauthorized kernel information, causing a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1651",
"url": "https://www.suse.com/security/cve/CVE-2022-1651"
},
{
"category": "external",
"summary": "SUSE Bug 1199433 for CVE-2022-1651",
"url": "https://bugzilla.suse.com/1199433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-1651"
},
{
"cve": "CVE-2022-1652",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1652"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1652",
"url": "https://www.suse.com/security/cve/CVE-2022-1652"
},
{
"category": "external",
"summary": "SUSE Bug 1199063 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1199063"
},
{
"category": "external",
"summary": "SUSE Bug 1200057 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1200057"
},
{
"category": "external",
"summary": "SUSE Bug 1200751 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1200751"
},
{
"category": "external",
"summary": "SUSE Bug 1201034 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1201034"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212307 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1212307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-1652"
},
{
"cve": "CVE-2022-1671",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1671"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in rxrpc_preparse_s in net/rxrpc/server_key.c in the Linux kernel. This flaw allows a local attacker to crash the system or leak internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1671",
"url": "https://www.suse.com/security/cve/CVE-2022-1671"
},
{
"category": "external",
"summary": "SUSE Bug 1199439 for CVE-2022-1671",
"url": "https://bugzilla.suse.com/1199439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-1671"
},
{
"cve": "CVE-2022-1679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1679"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1679",
"url": "https://www.suse.com/security/cve/CVE-2022-1679"
},
{
"category": "external",
"summary": "SUSE Bug 1199487 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "external",
"summary": "SUSE Bug 1201080 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212316 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1212316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1729"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1729",
"url": "https://www.suse.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "SUSE Bug 1199507 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199507"
},
{
"category": "external",
"summary": "SUSE Bug 1199697 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199697"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1201832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "important"
}
],
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1734",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1734"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1734",
"url": "https://www.suse.com/security/cve/CVE-2022-1734"
},
{
"category": "external",
"summary": "SUSE Bug 1199605 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1199605"
},
{
"category": "external",
"summary": "SUSE Bug 1199606 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1199606"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1201832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "important"
}
],
"title": "CVE-2022-1734"
},
{
"cve": "CVE-2022-1789",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1789"
}
],
"notes": [
{
"category": "general",
"text": "With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1789",
"url": "https://www.suse.com/security/cve/CVE-2022-1789"
},
{
"category": "external",
"summary": "SUSE Bug 1199674 for CVE-2022-1789",
"url": "https://bugzilla.suse.com/1199674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-1789"
},
{
"cve": "CVE-2022-1852",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1852"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1852",
"url": "https://www.suse.com/security/cve/CVE-2022-1852"
},
{
"category": "external",
"summary": "SUSE Bug 1199875 for CVE-2022-1852",
"url": "https://bugzilla.suse.com/1199875"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-1852"
},
{
"cve": "CVE-2022-1966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1966"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1966",
"url": "https://www.suse.com/security/cve/CVE-2022-1966"
},
{
"category": "external",
"summary": "SUSE Bug 1200015 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200015"
},
{
"category": "external",
"summary": "SUSE Bug 1200268 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200268"
},
{
"category": "external",
"summary": "SUSE Bug 1200494 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200494"
},
{
"category": "external",
"summary": "SUSE Bug 1200529 for CVE-2022-1966",
"url": "https://bugzilla.suse.com/1200529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "important"
}
],
"title": "CVE-2022-1966"
},
{
"cve": "CVE-2022-1972",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1972"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1972",
"url": "https://www.suse.com/security/cve/CVE-2022-1972"
},
{
"category": "external",
"summary": "SUSE Bug 1200019 for CVE-2022-1972",
"url": "https://bugzilla.suse.com/1200019"
},
{
"category": "external",
"summary": "SUSE Bug 1200266 for CVE-2022-1972",
"url": "https://bugzilla.suse.com/1200266"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-1972"
},
{
"cve": "CVE-2022-1974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1974"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1974",
"url": "https://www.suse.com/security/cve/CVE-2022-1974"
},
{
"category": "external",
"summary": "SUSE Bug 1200144 for CVE-2022-1974",
"url": "https://bugzilla.suse.com/1200144"
},
{
"category": "external",
"summary": "SUSE Bug 1200265 for CVE-2022-1974",
"url": "https://bugzilla.suse.com/1200265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-1974"
},
{
"cve": "CVE-2022-1998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1998"
}
],
"notes": [
{
"category": "general",
"text": "A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1998",
"url": "https://www.suse.com/security/cve/CVE-2022-1998"
},
{
"category": "external",
"summary": "SUSE Bug 1200284 for CVE-2022-1998",
"url": "https://bugzilla.suse.com/1200284"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-1998"
},
{
"cve": "CVE-2022-20132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20132"
}
],
"notes": [
{
"category": "general",
"text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20132",
"url": "https://www.suse.com/security/cve/CVE-2022-20132"
},
{
"category": "external",
"summary": "SUSE Bug 1200619 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "external",
"summary": "SUSE Bug 1212287 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1212287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20154"
}
],
"notes": [
{
"category": "general",
"text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20154",
"url": "https://www.suse.com/security/cve/CVE-2022-20154"
},
{
"category": "external",
"summary": "SUSE Bug 1200599 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "external",
"summary": "SUSE Bug 1200608 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-21123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21123"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21123",
"url": "https://www.suse.com/security/cve/CVE-2022-21123"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209075 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1209075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-21125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21125"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21125",
"url": "https://www.suse.com/security/cve/CVE-2022-21125"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209074 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1209074"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21127"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21127",
"url": "https://www.suse.com/security/cve/CVE-2022-21127"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21127",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21127",
"url": "https://bugzilla.suse.com/1200549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-21127"
},
{
"cve": "CVE-2022-21166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21166"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21166",
"url": "https://www.suse.com/security/cve/CVE-2022-21166"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209073 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1209073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21180"
}
],
"notes": [
{
"category": "general",
"text": "Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21180",
"url": "https://www.suse.com/security/cve/CVE-2022-21180"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1212313 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1212313"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-21180"
},
{
"cve": "CVE-2022-21499",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21499"
}
],
"notes": [
{
"category": "general",
"text": "KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21499",
"url": "https://www.suse.com/security/cve/CVE-2022-21499"
},
{
"category": "external",
"summary": "SUSE Bug 1199426 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1199426"
},
{
"category": "external",
"summary": "SUSE Bug 1200059 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1200059"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1203034"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212315 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1212315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "important"
}
],
"title": "CVE-2022-21499"
},
{
"cve": "CVE-2022-2318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2318"
}
],
"notes": [
{
"category": "general",
"text": "There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2318",
"url": "https://www.suse.com/security/cve/CVE-2022-2318"
},
{
"category": "external",
"summary": "SUSE Bug 1201251 for CVE-2022-2318",
"url": "https://bugzilla.suse.com/1201251"
},
{
"category": "external",
"summary": "SUSE Bug 1212303 for CVE-2022-2318",
"url": "https://bugzilla.suse.com/1212303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-2318"
},
{
"cve": "CVE-2022-23222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23222"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23222",
"url": "https://www.suse.com/security/cve/CVE-2022-23222"
},
{
"category": "external",
"summary": "SUSE Bug 1194765 for CVE-2022-23222",
"url": "https://bugzilla.suse.com/1194765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-23222"
},
{
"cve": "CVE-2022-26365",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26365"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26365",
"url": "https://www.suse.com/security/cve/CVE-2022-26365"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-26365",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-26365"
},
{
"cve": "CVE-2022-26490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-26490"
}
],
"notes": [
{
"category": "general",
"text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-26490",
"url": "https://www.suse.com/security/cve/CVE-2022-26490"
},
{
"category": "external",
"summary": "SUSE Bug 1196830 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1196830"
},
{
"category": "external",
"summary": "SUSE Bug 1201656 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1201656"
},
{
"category": "external",
"summary": "SUSE Bug 1201969 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1201969"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2022-26490",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "important"
}
],
"title": "CVE-2022-26490"
},
{
"cve": "CVE-2022-29582",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29582"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29582",
"url": "https://www.suse.com/security/cve/CVE-2022-29582"
},
{
"category": "external",
"summary": "SUSE Bug 1198811 for CVE-2022-29582",
"url": "https://bugzilla.suse.com/1198811"
},
{
"category": "external",
"summary": "SUSE Bug 1199750 for CVE-2022-29582",
"url": "https://bugzilla.suse.com/1199750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "important"
}
],
"title": "CVE-2022-29582"
},
{
"cve": "CVE-2022-29900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29900"
}
],
"notes": [
{
"category": "general",
"text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29900",
"url": "https://www.suse.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29901"
}
],
"notes": [
{
"category": "general",
"text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29901",
"url": "https://www.suse.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-30594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-30594"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-30594",
"url": "https://www.suse.com/security/cve/CVE-2022-30594"
},
{
"category": "external",
"summary": "SUSE Bug 1199505 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1199505"
},
{
"category": "external",
"summary": "SUSE Bug 1199602 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1199602"
},
{
"category": "external",
"summary": "SUSE Bug 1201549 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1201549"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1204132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "important"
}
],
"title": "CVE-2022-30594"
},
{
"cve": "CVE-2022-33740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33740"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33740",
"url": "https://www.suse.com/security/cve/CVE-2022-33740"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-33740",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-33740"
},
{
"cve": "CVE-2022-33741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33741"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33741",
"url": "https://www.suse.com/security/cve/CVE-2022-33741"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-33741",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-33741"
},
{
"cve": "CVE-2022-33742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33742"
}
],
"notes": [
{
"category": "general",
"text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don\u0027t zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn\u0027t allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33742",
"url": "https://www.suse.com/security/cve/CVE-2022-33742"
},
{
"category": "external",
"summary": "SUSE Bug 1200762 for CVE-2022-33742",
"url": "https://bugzilla.suse.com/1200762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-33742"
},
{
"cve": "CVE-2022-33743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33743"
}
],
"notes": [
{
"category": "general",
"text": "network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33743",
"url": "https://www.suse.com/security/cve/CVE-2022-33743"
},
{
"category": "external",
"summary": "SUSE Bug 1200763 for CVE-2022-33743",
"url": "https://bugzilla.suse.com/1200763"
},
{
"category": "external",
"summary": "SUSE Bug 1201629 for CVE-2022-33743",
"url": "https://bugzilla.suse.com/1201629"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "important"
}
],
"title": "CVE-2022-33743"
},
{
"cve": "CVE-2022-33981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33981"
}
],
"notes": [
{
"category": "general",
"text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33981",
"url": "https://www.suse.com/security/cve/CVE-2022-33981"
},
{
"category": "external",
"summary": "SUSE Bug 1200692 for CVE-2022-33981",
"url": "https://bugzilla.suse.com/1200692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "moderate"
}
],
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-34918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-34918"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-34918",
"url": "https://www.suse.com/security/cve/CVE-2022-34918"
},
{
"category": "external",
"summary": "SUSE Bug 1201171 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201171"
},
{
"category": "external",
"summary": "SUSE Bug 1201177 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201177"
},
{
"category": "external",
"summary": "SUSE Bug 1201222 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.s390x",
"SUSE Linux Enterprise Live Patching 15 SP4:kernel-livepatch-5_14_21-150400_24_11-default-1-150400.9.5.3.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-source-5.14.21-150400.24.11.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:cluster-md-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:cluster-md-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dlm-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:dlm-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:dtb-allwinner-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-altera-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amazon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-amlogic-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-apple-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-arm-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-broadcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-cavium-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-exynos-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-freescale-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-hisilicon-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-lg-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-marvell-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-mediatek-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-nvidia-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-qcom-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-renesas-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-rockchip-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-socionext-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-sprd-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:dtb-xilinx-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:gfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-64kb-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-debug-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.aarch64",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.ppc64le",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.s390x",
"openSUSE Leap 15.4:kernel-default-base-rebuild-5.14.21-150400.24.11.1.150400.24.3.6.x86_64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-extra-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-default-optional-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-devel-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-docs-html-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-kvmsmall-livepatch-devel-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-macros-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-build-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-obs-qa-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-source-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-source-vanilla-5.14.21-150400.24.11.1.noarch",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kernel-syms-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:kselftests-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:ocfs2-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:ocfs2-kmp-default-5.14.21-150400.24.11.1.x86_64",
"openSUSE Leap 15.4:reiserfs-kmp-64kb-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.aarch64",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.ppc64le",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.s390x",
"openSUSE Leap 15.4:reiserfs-kmp-default-5.14.21-150400.24.11.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-21T16:35:09Z",
"details": "important"
}
],
"title": "CVE-2022-34918"
}
]
}
icsa-23-166-11
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.0.\n\nSiemens has released a new version for SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem and recommends to update to the latest version.\n\nThis advisory lists vulnerabilities for firmware version V1.0 only; for V1.1 refer to Siemens Security Advisory SSA-265688 (\nhttps://cert-portal.siemens.com/productcert/html/ssa-265688.html).",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-794697.json"
},
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html"
},
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-794697.pdf"
},
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-794697.txt"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-166-11 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-166-11.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-166-11 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-11"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SIMATIC S7-1500 TM MFP Linux Kernel",
"tracking": {
"current_release_date": "2024-04-09T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-23-166-11",
"initial_release_date": "2023-06-13T00:00:00.000000Z",
"revision_history": [
{
"date": "2023-06-13T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2023-07-11T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added CVE-2022-4269, CVE-2023-3141, CVE-2023-3268, CVE-2023-31436, CVE-2023-32233"
},
{
"date": "2023-08-08T00:00:00.000000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added CVE-2023-3446, CVE-2023-3389, CVE-2022-1015, \r\nCVE-2023-3609"
},
{
"date": "2023-09-12T00:00:00.000000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added CVE-2023-3338"
},
{
"date": "2023-11-14T00:00:00.000000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added CVE-2023-1206, CVE-2023-2898, CVE-2023-3610, CVE-2023-3611, CVE-2023-3772, CVE-2023-3773, CVE-2023-3777, CVE-2023-4004, CVE-2023-4015, CVE-2023-4273, CVE-2023-4623, CVE-2023-4921, CVE-2023-35001, CVE-2023-37453, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42753, CVE-2023-42755"
},
{
"date": "2023-12-12T00:00:00.000000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added CVE-2021-44879, CVE-2023-5178, CVE-2023-5197, CVE-2023-5678, CVE-2023-5717, CVE-2023-31085, CVE-2023-35827, CVE-2023-39189, CVE-2023-42754, CVE-2023-45863, CVE-2023-45871"
},
{
"date": "2024-01-09T00:00:00.000000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added CVE-2023-48795"
},
{
"date": "2024-02-13T00:00:00.000000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Added CVE-2020-12762, CVE-2023-6606, CVE-2023-6931, CVE-2023-6932, CVE-2023-7008, CVE-2023-7104, CVE-2023-36660, CVE-2023-50495, CVE-2023-51384, CVE-2023-51385, CVE-2023-51767, CVE-2024-0232, CVE-2024-0553, CVE-2024-0567, CVE-2024-0584, CVE-2024-0684, CVE-2024-22365, CVE-2024-25062"
},
{
"date": "2024-04-09T00:00:00.000000Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Added fix for SIMATIC S7-1500 TM MFP - GNU/Linux subsystem"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.1",
"product": {
"name": "SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-12762",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2021-3759",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-4037",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2021-33655",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-44879",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-44879"
},
{
"cve": "CVE-2022-0171",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-0171"
},
{
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-1015",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1015"
},
{
"cve": "CVE-2022-1184",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u2019s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1292",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1343",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the verification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1343"
},
{
"cve": "CVE-2022-1434",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "When using the RC4-MD5 ciphersuite, which is disabled by default, an attacker is able to modify data in transit due to an incorrect use of the AAD data as the MAC key in OpenSSL 3.0. An attacker is not able to decrypt any communication.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1434"
},
{
"cve": "CVE-2022-1462",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1473",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1473"
},
{
"cve": "CVE-2022-1679",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1852",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1852"
},
{
"cve": "CVE-2022-1882",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1882"
},
{
"cve": "CVE-2022-2068",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-2078",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the Linux kernel\u0027s nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2078"
},
{
"cve": "CVE-2022-2097",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn\u0027t written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-2153",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u2019s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-2274",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2274"
},
{
"cve": "CVE-2022-2327",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "io_uring use work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. Some operations are missing some types, which can lead to incorrect reference counts which can then lead to a double free. We recommend upgrading the kernel past commit df3f3bb5059d20ef094d6b2f0256c4bf4127a859",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2327"
},
{
"cve": "CVE-2022-2503",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-2586",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_api.c function in the Linux kernel. This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-2588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2602",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. A race issue occurs between an io_uring request and the Unix socket garbage collector, allowing an attacker local privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-2663",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"notes": [
{
"category": "summary",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-2905",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2905"
},
{
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2959"
},
{
"cve": "CVE-2022-2978",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2978"
},
{
"cve": "CVE-2022-3028",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3104",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3104"
},
{
"cve": "CVE-2022-3115",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3115"
},
{
"cve": "CVE-2022-3169",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3303",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-3521",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3534",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability classified as critical has been found in Linux Kernel. Affected is the function btf_dump_name_dups of the file tools/lib/bpf/btf_dump.c of the component libbpf. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211032.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3534"
},
{
"cve": "CVE-2022-3545",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3564",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3565",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3586",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u2019s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3594",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3606",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function find_prog_by_sec_insn of the file tools/lib/bpf/libbpf.c of the component BPF. The manipulation leads to null pointer dereference. It is recommended to apply a patch to fix this issue. The identifier VDB-211749 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3606"
},
{
"cve": "CVE-2022-3621",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3625",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3628",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3629",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3633",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3633"
},
{
"cve": "CVE-2022-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3646",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-4095",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-4129",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4139",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4269",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action \"mirred\") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4269"
},
{
"cve": "CVE-2022-4304",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-4450",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-4662",
"cwe": {
"id": "CWE-455",
"name": "Non-exit on Failed Initialization"
},
"notes": [
{
"category": "summary",
"text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-20421",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-20421"
},
{
"cve": "CVE-2022-20422",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-20422"
},
{
"cve": "CVE-2022-20566",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In l2cap_chan_put of l2cap_core, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-165329981References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-20566"
},
{
"cve": "CVE-2022-20572",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "In verity_target of dm-verity-target.c, there is a possible way to modify read-only files due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-234475629References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-20572"
},
{
"cve": "CVE-2022-21123",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-21125",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21166",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21505",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"notes": [
{
"category": "summary",
"text": "A bug in the IMA subsystem was discovered which would incorrectly allow kexec to be used when kernel lockdown was enabled",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-21505"
},
{
"cve": "CVE-2022-26373",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-32250"
},
{
"cve": "CVE-2022-32296",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-34918",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-34918"
},
{
"cve": "CVE-2022-36123",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-36123"
},
{
"cve": "CVE-2022-36280",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file \u0027/dev/dri/renderD128 (or Dxxx)\u0027. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-36879",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-39188",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39190",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-39190"
},
{
"cve": "CVE-2022-40307",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40768",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "summary",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-41218",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-41674",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-41849",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-41849"
},
{
"cve": "CVE-2022-41850",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-42328",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "Guests can trigger deadlock in Linux netback driver [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "Guests can trigger deadlock in Linux netback drive. The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42432",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"notes": [
{
"category": "summary",
"text": "This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel 6.0-rc2. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the nft_osf_eval function. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-18540.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42432"
},
{
"cve": "CVE-2022-42703",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42719",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42720",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42721",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42722",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-42895",
"cwe": {
"id": "CWE-824",
"name": "Access of Uninitialized Pointer"
},
"notes": [
{
"category": "summary",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-43750",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-47518",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-47518"
},
{
"cve": "CVE-2022-47520",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-47520"
},
{
"cve": "CVE-2022-47929",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with \"tc qdisc\" and \"tc class\" commands. This affects qdisc_graft in net/sched/sch_api.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-47946",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-47946"
},
{
"cve": "CVE-2023-0215",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0464",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Applications that use a non-default option when verifying certificates may be\r\nvulnerable to an attack from a malicious CA to circumvent certain checks.\r\n\r\nInvalid certificate policies in leaf certificates are silently ignored by\r\nOpenSSL and other certificate policy checks are skipped for that certificate.\r\nA malicious CA could use this to deliberately assert invalid certificate policies\r\nin order to circumvent policy checking on the certificate altogether.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing\r\nthe `-policy` argument to the command line utilities or by calling the\r\n`X509_VERIFY_PARAM_set1_policies()` function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "The function X509_VERIFY_PARAM_add0_policy() is documented to\nimplicitly enable the certificate policy check when doing certificate\nverification. However the implementation of the function does not\nenable the check which allows certificates with invalid or incorrect\npolicies to pass the certificate verification.\n\nAs suddenly enabling the policy check could break existing deployments it was\ndecided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()\nfunction.\n\nInstead the applications that require OpenSSL to perform certificate\npolicy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly\nenable the policy check by calling X509_VERIFY_PARAM_set_flags() with\nthe X509_V_FLAG_POLICY_CHECK flag argument.\n\nCertificate policy checks are disabled by default in OpenSSL and are not\ncommonly used by applications.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0590",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-1077",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-1077"
},
{
"cve": "CVE-2023-1095",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1206",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-1206"
},
{
"cve": "CVE-2023-2898",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-2898"
},
{
"cve": "CVE-2023-3141",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3141"
},
{
"cve": "CVE-2023-3268",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3268"
},
{
"cve": "CVE-2023-3338",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A null pointer dereference flaw was found in the Linux kernel\u0027s DECnet networking protocol. This issue could allow a remote user to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3338"
},
{
"cve": "CVE-2023-3389",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.\r\n\r\nWe recommend upgrading past commit `ef7dfac51d8ed961b742218f526bd589f3900a59` \r\n(`4716c73b188566865bdd79c3a6709696a224ac04` for 5.10 stable and \r\n`0e388fce7aec40992eadee654193cad345d62663` for 5.15 stable).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3389"
},
{
"cve": "CVE-2023-3446",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (\u0027p\u0027 parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \u0027-check\u0027 option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3609",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3609"
},
{
"cve": "CVE-2023-3610",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nFlaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3610"
},
{
"cve": "CVE-2023-3611",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-3772",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3772"
},
{
"cve": "CVE-2023-3773",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3773"
},
{
"cve": "CVE-2023-3777",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nWhen nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain\u0027s owner rule can also release the objects in certain circumstances.\n\nWe recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3777"
},
{
"cve": "CVE-2023-4004",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4004"
},
{
"cve": "CVE-2023-4015",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The netfilter subsystem in the Linux kernel did not properly handle bound chain deactivation in certain circumstances. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4015"
},
{
"cve": "CVE-2023-4273",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "This vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this vulnerability to overflow the kernel stack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4273"
},
{
"cve": "CVE-2023-4623",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4623"
},
{
"cve": "CVE-2023-4911",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4911"
},
{
"cve": "CVE-2023-4921",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4921"
},
{
"cve": "CVE-2023-5178",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious local privileged user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-5178"
},
{
"cve": "CVE-2023-5197",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nAddition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.\r\n\r\nWe recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-5197"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5717",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\r\n\r\nIf perf_read_group() is called while an event\u0027s sibling_list is smaller than its child\u0027s sibling_list, it can increment or write to memory locations outside of the allocated buffer.\r\n\r\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-5717"
},
{
"cve": "CVE-2023-6606",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-6606"
},
{
"cve": "CVE-2023-6931",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-6931"
},
{
"cve": "CVE-2023-6932",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-6932"
},
{
"cve": "CVE-2023-7008",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-7008"
},
{
"cve": "CVE-2023-7104",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-7104"
},
{
"cve": "CVE-2023-23454",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-23455",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-23559",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-26607",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-26607"
},
{
"cve": "CVE-2023-31085",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd-\u003eerasesize), used indirectly by ctrl_cdev_ioctl, when mtd-\u003eerasesize is 0.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-31085"
},
{
"cve": "CVE-2023-31436",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-31436"
},
{
"cve": "CVE-2023-32233",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-32233"
},
{
"cve": "CVE-2023-35001",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-35001"
},
{
"cve": "CVE-2023-35827",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-35827"
},
{
"cve": "CVE-2023-36660",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The OCB feature in libnettle in Nettle 3.9 before 3.9.1 allows memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-36660"
},
{
"cve": "CVE-2023-37453",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-37453"
},
{
"cve": "CVE-2023-39189",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-39189"
},
{
"cve": "CVE-2023-39192",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-39192"
},
{
"cve": "CVE-2023-39193",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-39193"
},
{
"cve": "CVE-2023-39194",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-39194"
},
{
"cve": "CVE-2023-42753",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-42754",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-42754"
},
{
"cve": "CVE-2023-42755",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-42755"
},
{
"cve": "CVE-2023-45863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-45863"
},
{
"cve": "CVE-2023-45871",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-45871"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "summary",
"text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-50495",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-50495"
},
{
"cve": "CVE-2023-51384",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-51767",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-51767"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0553",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0553"
},
{
"cve": "CVE-2024-0567",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0567"
},
{
"cve": "CVE-2024-0584",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0584"
},
{
"cve": "CVE-2024-0684",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the GNU coreutils \"split\" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0684"
},
{
"cve": "CVE-2024-22365",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-22365"
},
{
"cve": "CVE-2024-25062",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-25062"
}
]
}
ICSA-23-194-04
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SIMATIC MV500 devices before V3.3.4 are affected by multiple vulnerabilities in the web server and several third-party components.\n\nSiemens has released updates for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-561322: Multiple Vulnerabilities in SIMATIC MV500 Devices before V3.3.4 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-561322.json"
},
{
"category": "self",
"summary": "SSA-561322: Multiple Vulnerabilities in SIMATIC MV500 Devices before V3.3.4 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-561322.html"
},
{
"category": "self",
"summary": "SSA-561322: Multiple Vulnerabilities in SIMATIC MV500 Devices before V3.3.4 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-561322.pdf"
},
{
"category": "self",
"summary": "SSA-561322: Multiple Vulnerabilities in SIMATIC MV500 Devices before V3.3.4 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-561322.txt"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-194-04 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-194-04.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-194-04 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-194-04"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SIMATIC MV500 Devices",
"tracking": {
"current_release_date": "2025-05-06T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-23-194-04",
"initial_release_date": "2023-07-11T00:00:00.000000Z",
"revision_history": [
{
"date": "2023-07-11T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-05-06T06:00:00.000000Z",
"legacy_version": "Revision",
"number": "2",
"summary": "Revision - Fixing typos"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3.4",
"product": {
"name": "SIMATIC MV540 H (6GF3540-0GE10)",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"model_numbers": [
"6GF3540-0GE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV540 H (6GF3540-0GE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3.4",
"product": {
"name": "SIMATIC MV540 S (6GF3540-0CD10)",
"product_id": "CSAFPID-0002",
"product_identification_helper": {
"model_numbers": [
"6GF3540-0CD10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV540 S (6GF3540-0CD10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3.4",
"product": {
"name": "SIMATIC MV550 H (6GF3550-0GE10)",
"product_id": "CSAFPID-0003",
"product_identification_helper": {
"model_numbers": [
"6GF3550-0GE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV550 H (6GF3550-0GE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3.4",
"product": {
"name": "SIMATIC MV550 S (6GF3550-0CD10)",
"product_id": "CSAFPID-0004",
"product_identification_helper": {
"model_numbers": [
"6GF3550-0CD10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV550 S (6GF3550-0CD10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3.4",
"product": {
"name": "SIMATIC MV560 U (6GF3560-0LE10)",
"product_id": "CSAFPID-0005",
"product_identification_helper": {
"model_numbers": [
"6GF3560-0LE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV560 U (6GF3560-0LE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3.4",
"product": {
"name": "SIMATIC MV560 X (6GF3560-0HE10)",
"product_id": "CSAFPID-0006",
"product_identification_helper": {
"model_numbers": [
"6GF3560-0HE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV560 X (6GF3560-0HE10)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-46828",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2021-46828"
},
{
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-4304",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-4450",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-30767",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2022-30767"
},
{
"cve": "CVE-2022-36946",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-37434",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-48285",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "loadAsync in JSZip before 3.8.0 allows Directory Traversal via a crafted ZIP archive.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2022-48285"
},
{
"cve": "CVE-2023-0215",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-35920",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Affected devices cannot properly process specially crafted IP packets sent to the devices. This could allow an unauthenticated remote attacker to cause a denial of service condition. The affected devices must be restarted manually.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2023-35920"
},
{
"cve": "CVE-2023-35921",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Affected devices cannot properly process specially crafted Ethernet frames sent to the devices. This could allow an unauthenticated remote attacker to cause a denial of service condition. The affected devices must be restarted manually.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2023-35921"
},
{
"cve": "CVE-2023-36521",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "The result synchronization server of the affected products contains a\r\nvulnerability that may lead to a denial of service condition. An attacker may\r\ncause a denial of service situation of all socket-based communication of the\r\naffected products if the result server is enabled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2023-36521"
}
]
}
ICSA-23-166-11
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.0.\n\nSiemens has released a new version for SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem and recommends to update to the latest version.\n\nThis advisory lists vulnerabilities for firmware version V1.0 only; for V1.1 refer to Siemens Security Advisory SSA-265688 (\nhttps://cert-portal.siemens.com/productcert/html/ssa-265688.html).",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-794697.json"
},
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html"
},
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-794697.pdf"
},
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-794697.txt"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-166-11 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-166-11.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-166-11 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-11"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SIMATIC S7-1500 TM MFP Linux Kernel",
"tracking": {
"current_release_date": "2024-04-09T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-23-166-11",
"initial_release_date": "2023-06-13T00:00:00.000000Z",
"revision_history": [
{
"date": "2023-06-13T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2023-07-11T00:00:00.000000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added CVE-2022-4269, CVE-2023-3141, CVE-2023-3268, CVE-2023-31436, CVE-2023-32233"
},
{
"date": "2023-08-08T00:00:00.000000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added CVE-2023-3446, CVE-2023-3389, CVE-2022-1015, \r\nCVE-2023-3609"
},
{
"date": "2023-09-12T00:00:00.000000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added CVE-2023-3338"
},
{
"date": "2023-11-14T00:00:00.000000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added CVE-2023-1206, CVE-2023-2898, CVE-2023-3610, CVE-2023-3611, CVE-2023-3772, CVE-2023-3773, CVE-2023-3777, CVE-2023-4004, CVE-2023-4015, CVE-2023-4273, CVE-2023-4623, CVE-2023-4921, CVE-2023-35001, CVE-2023-37453, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42753, CVE-2023-42755"
},
{
"date": "2023-12-12T00:00:00.000000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added CVE-2021-44879, CVE-2023-5178, CVE-2023-5197, CVE-2023-5678, CVE-2023-5717, CVE-2023-31085, CVE-2023-35827, CVE-2023-39189, CVE-2023-42754, CVE-2023-45863, CVE-2023-45871"
},
{
"date": "2024-01-09T00:00:00.000000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added CVE-2023-48795"
},
{
"date": "2024-02-13T00:00:00.000000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Added CVE-2020-12762, CVE-2023-6606, CVE-2023-6931, CVE-2023-6932, CVE-2023-7008, CVE-2023-7104, CVE-2023-36660, CVE-2023-50495, CVE-2023-51384, CVE-2023-51385, CVE-2023-51767, CVE-2024-0232, CVE-2024-0553, CVE-2024-0567, CVE-2024-0584, CVE-2024-0684, CVE-2024-22365, CVE-2024-25062"
},
{
"date": "2024-04-09T00:00:00.000000Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Added fix for SIMATIC S7-1500 TM MFP - GNU/Linux subsystem"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.1",
"product": {
"name": "SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-12762",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2021-3759",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-4037",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2021-33655",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-44879",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2021-44879"
},
{
"cve": "CVE-2022-0171",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-0171"
},
{
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-1015",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1015"
},
{
"cve": "CVE-2022-1184",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u2019s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1292",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1343",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the verification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1343"
},
{
"cve": "CVE-2022-1434",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "When using the RC4-MD5 ciphersuite, which is disabled by default, an attacker is able to modify data in transit due to an incorrect use of the AAD data as the MAC key in OpenSSL 3.0. An attacker is not able to decrypt any communication.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1434"
},
{
"cve": "CVE-2022-1462",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1473",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1473"
},
{
"cve": "CVE-2022-1679",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1852",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1852"
},
{
"cve": "CVE-2022-1882",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-1882"
},
{
"cve": "CVE-2022-2068",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-2078",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the Linux kernel\u0027s nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2078"
},
{
"cve": "CVE-2022-2097",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn\u0027t written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-2153",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u2019s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-2274",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2274"
},
{
"cve": "CVE-2022-2327",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "io_uring use work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. Some operations are missing some types, which can lead to incorrect reference counts which can then lead to a double free. We recommend upgrading the kernel past commit df3f3bb5059d20ef094d6b2f0256c4bf4127a859",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2327"
},
{
"cve": "CVE-2022-2503",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-2586",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_api.c function in the Linux kernel. This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-2588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2602",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. A race issue occurs between an io_uring request and the Unix socket garbage collector, allowing an attacker local privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-2663",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"notes": [
{
"category": "summary",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-2905",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2905"
},
{
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2959"
},
{
"cve": "CVE-2022-2978",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-2978"
},
{
"cve": "CVE-2022-3028",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3104",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3104"
},
{
"cve": "CVE-2022-3115",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3115"
},
{
"cve": "CVE-2022-3169",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3303",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-3521",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3534",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability classified as critical has been found in Linux Kernel. Affected is the function btf_dump_name_dups of the file tools/lib/bpf/btf_dump.c of the component libbpf. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211032.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3534"
},
{
"cve": "CVE-2022-3545",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3564",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3565",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3586",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u2019s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3594",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3606",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function find_prog_by_sec_insn of the file tools/lib/bpf/libbpf.c of the component BPF. The manipulation leads to null pointer dereference. It is recommended to apply a patch to fix this issue. The identifier VDB-211749 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3606"
},
{
"cve": "CVE-2022-3621",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3625",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3628",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3629",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3633",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3633"
},
{
"cve": "CVE-2022-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3646",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-4095",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-4129",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4139",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4269",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action \"mirred\") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4269"
},
{
"cve": "CVE-2022-4304",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-4450",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-4662",
"cwe": {
"id": "CWE-455",
"name": "Non-exit on Failed Initialization"
},
"notes": [
{
"category": "summary",
"text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-20421",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-20421"
},
{
"cve": "CVE-2022-20422",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-20422"
},
{
"cve": "CVE-2022-20566",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In l2cap_chan_put of l2cap_core, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-165329981References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-20566"
},
{
"cve": "CVE-2022-20572",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "In verity_target of dm-verity-target.c, there is a possible way to modify read-only files due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-234475629References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-20572"
},
{
"cve": "CVE-2022-21123",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-21125",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21166",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21505",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"notes": [
{
"category": "summary",
"text": "A bug in the IMA subsystem was discovered which would incorrectly allow kexec to be used when kernel lockdown was enabled",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-21505"
},
{
"cve": "CVE-2022-26373",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-32250"
},
{
"cve": "CVE-2022-32296",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-34918",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-34918"
},
{
"cve": "CVE-2022-36123",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-36123"
},
{
"cve": "CVE-2022-36280",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file \u0027/dev/dri/renderD128 (or Dxxx)\u0027. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-36879",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-39188",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39190",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-39190"
},
{
"cve": "CVE-2022-40307",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40768",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "summary",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-41218",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-41674",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-41849",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-41849"
},
{
"cve": "CVE-2022-41850",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-42328",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "Guests can trigger deadlock in Linux netback driver [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "Guests can trigger deadlock in Linux netback drive. The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42432",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"notes": [
{
"category": "summary",
"text": "This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel 6.0-rc2. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the nft_osf_eval function. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-18540.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42432"
},
{
"cve": "CVE-2022-42703",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42719",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42720",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42721",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42722",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-42895",
"cwe": {
"id": "CWE-824",
"name": "Access of Uninitialized Pointer"
},
"notes": [
{
"category": "summary",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-43750",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-47518",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-47518"
},
{
"cve": "CVE-2022-47520",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-47520"
},
{
"cve": "CVE-2022-47929",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with \"tc qdisc\" and \"tc class\" commands. This affects qdisc_graft in net/sched/sch_api.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-47946",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2022-47946"
},
{
"cve": "CVE-2023-0215",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0464",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Applications that use a non-default option when verifying certificates may be\r\nvulnerable to an attack from a malicious CA to circumvent certain checks.\r\n\r\nInvalid certificate policies in leaf certificates are silently ignored by\r\nOpenSSL and other certificate policy checks are skipped for that certificate.\r\nA malicious CA could use this to deliberately assert invalid certificate policies\r\nin order to circumvent policy checking on the certificate altogether.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing\r\nthe `-policy` argument to the command line utilities or by calling the\r\n`X509_VERIFY_PARAM_set1_policies()` function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "The function X509_VERIFY_PARAM_add0_policy() is documented to\nimplicitly enable the certificate policy check when doing certificate\nverification. However the implementation of the function does not\nenable the check which allows certificates with invalid or incorrect\npolicies to pass the certificate verification.\n\nAs suddenly enabling the policy check could break existing deployments it was\ndecided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()\nfunction.\n\nInstead the applications that require OpenSSL to perform certificate\npolicy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly\nenable the policy check by calling X509_VERIFY_PARAM_set_flags() with\nthe X509_V_FLAG_POLICY_CHECK flag argument.\n\nCertificate policy checks are disabled by default in OpenSSL and are not\ncommonly used by applications.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0590",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-1077",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-1077"
},
{
"cve": "CVE-2023-1095",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1206",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-1206"
},
{
"cve": "CVE-2023-2898",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-2898"
},
{
"cve": "CVE-2023-3141",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3141"
},
{
"cve": "CVE-2023-3268",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3268"
},
{
"cve": "CVE-2023-3338",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A null pointer dereference flaw was found in the Linux kernel\u0027s DECnet networking protocol. This issue could allow a remote user to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3338"
},
{
"cve": "CVE-2023-3389",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.\r\n\r\nWe recommend upgrading past commit `ef7dfac51d8ed961b742218f526bd589f3900a59` \r\n(`4716c73b188566865bdd79c3a6709696a224ac04` for 5.10 stable and \r\n`0e388fce7aec40992eadee654193cad345d62663` for 5.15 stable).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3389"
},
{
"cve": "CVE-2023-3446",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (\u0027p\u0027 parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \u0027-check\u0027 option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3609",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3609"
},
{
"cve": "CVE-2023-3610",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nFlaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3610"
},
{
"cve": "CVE-2023-3611",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-3772",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3772"
},
{
"cve": "CVE-2023-3773",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3773"
},
{
"cve": "CVE-2023-3777",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nWhen nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain\u0027s owner rule can also release the objects in certain circumstances.\n\nWe recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-3777"
},
{
"cve": "CVE-2023-4004",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4004"
},
{
"cve": "CVE-2023-4015",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The netfilter subsystem in the Linux kernel did not properly handle bound chain deactivation in certain circumstances. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4015"
},
{
"cve": "CVE-2023-4273",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "This vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this vulnerability to overflow the kernel stack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4273"
},
{
"cve": "CVE-2023-4623",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4623"
},
{
"cve": "CVE-2023-4911",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4911"
},
{
"cve": "CVE-2023-4921",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-4921"
},
{
"cve": "CVE-2023-5178",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious local privileged user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-5178"
},
{
"cve": "CVE-2023-5197",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nAddition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.\r\n\r\nWe recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-5197"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5717",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\r\n\r\nIf perf_read_group() is called while an event\u0027s sibling_list is smaller than its child\u0027s sibling_list, it can increment or write to memory locations outside of the allocated buffer.\r\n\r\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-5717"
},
{
"cve": "CVE-2023-6606",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-6606"
},
{
"cve": "CVE-2023-6931",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-6931"
},
{
"cve": "CVE-2023-6932",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-6932"
},
{
"cve": "CVE-2023-7008",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-7008"
},
{
"cve": "CVE-2023-7104",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-7104"
},
{
"cve": "CVE-2023-23454",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-23455",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-23559",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-26607",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-26607"
},
{
"cve": "CVE-2023-31085",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd-\u003eerasesize), used indirectly by ctrl_cdev_ioctl, when mtd-\u003eerasesize is 0.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-31085"
},
{
"cve": "CVE-2023-31436",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-31436"
},
{
"cve": "CVE-2023-32233",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-32233"
},
{
"cve": "CVE-2023-35001",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-35001"
},
{
"cve": "CVE-2023-35827",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-35827"
},
{
"cve": "CVE-2023-36660",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The OCB feature in libnettle in Nettle 3.9 before 3.9.1 allows memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-36660"
},
{
"cve": "CVE-2023-37453",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-37453"
},
{
"cve": "CVE-2023-39189",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-39189"
},
{
"cve": "CVE-2023-39192",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-39192"
},
{
"cve": "CVE-2023-39193",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-39193"
},
{
"cve": "CVE-2023-39194",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-39194"
},
{
"cve": "CVE-2023-42753",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-42754",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-42754"
},
{
"cve": "CVE-2023-42755",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-42755"
},
{
"cve": "CVE-2023-45863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-45863"
},
{
"cve": "CVE-2023-45871",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-45871"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "summary",
"text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-50495",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-50495"
},
{
"cve": "CVE-2023-51384",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-51767",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2023-51767"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0553",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0553"
},
{
"cve": "CVE-2024-0567",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0567"
},
{
"cve": "CVE-2024-0584",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0584"
},
{
"cve": "CVE-2024-0684",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the GNU coreutils \"split\" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-0684"
},
{
"cve": "CVE-2024-22365",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-22365"
},
{
"cve": "CVE-2024-25062",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"CSAFPID-0001"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"CSAFPID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
],
"title": "CVE-2024-25062"
}
]
}
icsa-23-194-04
Vulnerability from csaf_cisa
Notes
{
"document": {
"acknowledgments": [
{
"organization": "Siemens ProductCERT",
"summary": "reporting these vulnerabilities to CISA."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "SIMATIC MV500 devices before V3.3.4 are affected by multiple vulnerabilities in the web server and several third-party components.\n\nSiemens has released updates for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "other",
"text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.",
"title": "Advisory Conversion Disclaimer"
},
{
"category": "other",
"text": "Multiple",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "other",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "SSA-561322: Multiple Vulnerabilities in SIMATIC MV500 Devices before V3.3.4 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-561322.json"
},
{
"category": "self",
"summary": "SSA-561322: Multiple Vulnerabilities in SIMATIC MV500 Devices before V3.3.4 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-561322.html"
},
{
"category": "self",
"summary": "SSA-561322: Multiple Vulnerabilities in SIMATIC MV500 Devices before V3.3.4 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-561322.pdf"
},
{
"category": "self",
"summary": "SSA-561322: Multiple Vulnerabilities in SIMATIC MV500 Devices before V3.3.4 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-561322.txt"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-194-04 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-194-04.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-23-194-04 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-194-04"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Siemens SIMATIC MV500 Devices",
"tracking": {
"current_release_date": "2025-05-06T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-23-194-04",
"initial_release_date": "2023-07-11T00:00:00.000000Z",
"revision_history": [
{
"date": "2023-07-11T00:00:00.000000Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2025-05-06T06:00:00.000000Z",
"legacy_version": "Revision",
"number": "2",
"summary": "Revision - Fixing typos"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3.4",
"product": {
"name": "SIMATIC MV540 H (6GF3540-0GE10)",
"product_id": "CSAFPID-0001",
"product_identification_helper": {
"model_numbers": [
"6GF3540-0GE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV540 H (6GF3540-0GE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3.4",
"product": {
"name": "SIMATIC MV540 S (6GF3540-0CD10)",
"product_id": "CSAFPID-0002",
"product_identification_helper": {
"model_numbers": [
"6GF3540-0CD10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV540 S (6GF3540-0CD10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3.4",
"product": {
"name": "SIMATIC MV550 H (6GF3550-0GE10)",
"product_id": "CSAFPID-0003",
"product_identification_helper": {
"model_numbers": [
"6GF3550-0GE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV550 H (6GF3550-0GE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3.4",
"product": {
"name": "SIMATIC MV550 S (6GF3550-0CD10)",
"product_id": "CSAFPID-0004",
"product_identification_helper": {
"model_numbers": [
"6GF3550-0CD10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV550 S (6GF3550-0CD10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3.4",
"product": {
"name": "SIMATIC MV560 U (6GF3560-0LE10)",
"product_id": "CSAFPID-0005",
"product_identification_helper": {
"model_numbers": [
"6GF3560-0LE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV560 U (6GF3560-0LE10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV3.3.4",
"product": {
"name": "SIMATIC MV560 X (6GF3560-0HE10)",
"product_id": "CSAFPID-0006",
"product_identification_helper": {
"model_numbers": [
"6GF3560-0HE10"
]
}
}
}
],
"category": "product_name",
"name": "SIMATIC MV560 X (6GF3560-0HE10)"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-46828",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2021-46828"
},
{
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-4304",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-4450",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-30767",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2022-30767"
},
{
"cve": "CVE-2022-36946",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-37434",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-48285",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "summary",
"text": "loadAsync in JSZip before 3.8.0 allows Directory Traversal via a crafted ZIP archive.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2022-48285"
},
{
"cve": "CVE-2023-0215",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-35920",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Affected devices cannot properly process specially crafted IP packets sent to the devices. This could allow an unauthenticated remote attacker to cause a denial of service condition. The affected devices must be restarted manually.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2023-35920"
},
{
"cve": "CVE-2023-35921",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "Affected devices cannot properly process specially crafted Ethernet frames sent to the devices. This could allow an unauthenticated remote attacker to cause a denial of service condition. The affected devices must be restarted manually.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2023-35921"
},
{
"cve": "CVE-2023-36521",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "summary",
"text": "The result synchronization server of the affected products contains a\r\nvulnerability that may lead to a denial of service condition. An attacker may\r\ncause a denial of service situation of all socket-based communication of the\r\naffected products if the result server is enabled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V3.3.4 or later version",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109821128/"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006"
]
}
],
"title": "CVE-2023-36521"
}
]
}
CERTFR-2022-AVI-858
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données, un contournement de la politique de sécurité et une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-33741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33741"
},
{
"name": "CVE-2022-33742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33742"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-33740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33740"
},
{
"name": "CVE-2022-34494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34494"
},
{
"name": "CVE-2022-33744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33744"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-33743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33743"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-34495",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34495"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-26365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26365"
}
],
"initial_release_date": "2022-09-28T00:00:00",
"last_revision_date": "2022-09-28T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 26 septembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5640-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 26 septembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5639-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 26 septembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5644-1"
}
],
"reference": "CERTFR-2022-AVI-858",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-09-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, un contournement de la politique de\ns\u00e9curit\u00e9 et une ex\u00e9cution de code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5644-1 du 26 septembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5639-1 du 26 septembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5640-1 du 26 septembre 2022",
"url": null
}
]
}
CERTFR-2022-AVI-877
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une élévation de privilèges, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.1 | ||
| SUSE | N/A | SUSE Enterprise Storage 7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP2 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-LTSS | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 15-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-29581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29581"
},
{
"name": "CVE-2022-2977",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2977"
},
{
"name": "CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"name": "CVE-2022-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20166"
},
{
"name": "CVE-2020-36516",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36516"
},
{
"name": "CVE-2016-3695",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3695"
},
{
"name": "CVE-2020-27784",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27784"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2905"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
}
],
"initial_release_date": "2022-10-04T00:00:00",
"last_revision_date": "2022-10-04T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 30 septembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223476-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 28\u00a0septembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223450-1/"
}
],
"reference": "CERTFR-2022-AVI-877",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9, une\n\u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3476-1 du 30 septembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3450-1 du 28 septembre 2022",
"url": null
}
]
}
CERTFR-2022-AVI-890
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données, un contournement de la politique de sécurité et une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
}
],
"initial_release_date": "2022-10-07T00:00:00",
"last_revision_date": "2022-10-07T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 06 oct. 2022",
"url": "https://ubuntu.com/security/notices/USN-5660-1"
}
],
"reference": "CERTFR-2022-AVI-890",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-07T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, un contournement de la politique de\ns\u00e9curit\u00e9 et une ex\u00e9cution de code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5660-1 du 06 oct. 2022",
"url": null
}
]
}
CERTFR-2022-AVI-669
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.4 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"name": "CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
}
],
"initial_release_date": "2022-07-22T00:00:00",
"last_revision_date": "2022-07-22T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-669",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:5626 du 19 juillet 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:5633 du 19 juillet 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:5640 du 19 juillet 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5640"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2022:5636 du 19 juillet 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5636"
}
]
}
CERTFR-2022-AVI-807
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33656"
},
{
"name": "CVE-2021-33061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33061"
},
{
"name": "CVE-2022-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1943"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-1852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1852"
},
{
"name": "CVE-2022-1973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1973"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
}
],
"initial_release_date": "2022-09-09T00:00:00",
"last_revision_date": "2022-09-09T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-807",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-09-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5602-1 du 08 septembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5602-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5603-1 du 08 septembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5603-1"
}
]
}
CERTFR-2022-AVI-710
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21127"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2022-20132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20132"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-33741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33741"
},
{
"name": "CVE-2022-33742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33742"
},
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2022-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21499"
},
{
"name": "CVE-2022-33740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33740"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"name": "CVE-2019-19377",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19377"
},
{
"name": "CVE-2021-33061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33061"
},
{
"name": "CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"name": "CVE-2021-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39711"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1734"
},
{
"name": "CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"name": "CVE-2022-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1836"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-21180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21180"
},
{
"name": "CVE-2022-26365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26365"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
}
],
"initial_release_date": "2022-08-04T00:00:00",
"last_revision_date": "2022-08-04T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-710",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222629-1 du 4 ao\u00fbt 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222629-1/"
}
]
}
CERTFR-2022-AVI-644
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12-SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP4 | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-20132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20132"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2017-16525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16525"
},
{
"name": "CVE-2022-33741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33741"
},
{
"name": "CVE-2022-33742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33742"
},
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2022-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21499"
},
{
"name": "CVE-2022-33740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33740"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"name": "CVE-2019-19377",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19377"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-26365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26365"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
}
],
"initial_release_date": "2022-07-15T00:00:00",
"last_revision_date": "2022-07-15T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-644",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nun contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222393-1 du 14 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222393-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222379-1 du 13 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222379-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222382-1 du 13 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222382-1/"
}
]
}
CERTFR-2022-AVI-602
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian 9 \"Stretch\" versions ant\u00e9rieures \u00e0 4.9.320-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28356"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23037"
},
{
"name": "CVE-2022-23042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23042"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-23036",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23036"
},
{
"name": "CVE-2018-1108",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1108"
},
{
"name": "CVE-2022-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
},
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23038"
},
{
"name": "CVE-2022-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26966"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0494"
},
{
"name": "CVE-2022-0812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0812"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-23039",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23039"
},
{
"name": "CVE-2022-27223",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27223"
},
{
"name": "CVE-2022-23040",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23040"
},
{
"name": "CVE-2021-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39713"
},
{
"name": "CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-23041",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23041"
},
{
"name": "CVE-2022-24958",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24958"
},
{
"name": "CVE-2022-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1734"
},
{
"name": "CVE-2022-26490",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26490"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-4149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4149"
},
{
"name": "CVE-2022-1199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1199"
},
{
"name": "CVE-2022-28390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28390"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2022-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1516"
},
{
"name": "CVE-2022-1198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1198"
},
{
"name": "CVE-2022-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2153"
}
],
"initial_release_date": "2022-07-04T00:00:00",
"last_revision_date": "2022-07-04T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-602",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nDebian LTS. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de\nservice et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS dla-3065 du 01 juillet 2022",
"url": "https://www.debian.org/lts/security/2022/dla-3065"
}
]
}
CERTFR-2023-AVI-0453
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SINAMICS GL150 versions antérieures à 7.2 | ||
| Siemens | N/A | Teamcenter Visualization versions 13.3.x antérieures à 13.3.0.10 | ||
| Siemens | N/A | SIMOTION D425-2 DP (6AU1425-2AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | CP-8050 MASTER MODULE (6MF2805-0AA00) versions antérieures à CPCI85 V05 | ||
| Siemens | N/A | POWER METER SICAM Q200 family versions antérieures à 2.70 | ||
| Siemens | N/A | SIMATIC NET PC Software V15 toutes versions | ||
| Siemens | N/A | SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA1) toutes versions | ||
| Siemens | N/A | SIMOTION D410-2 DP (6AU1410-2AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC STEP 7 V5 versions antérieures à 5.7 | ||
| Siemens | N/A | SIMOTION C240 (6AU1240-1AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC S7-1500 TM MFP - Linux Kernel | ||
| Siemens | N/A | SINAUT Software ST7sc toutes versions | ||
| Siemens | N/A | SIMOTION P320-4 E (6AU1320-4DE65-3AF0) toutes versions | ||
| Siemens | N/A | Teamcenter Visualization versions 14.0.x antérieures à 14.0.0.6 | ||
| Siemens | N/A | SIMOTION C240 PN (6AU1240-1AB00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC NET PC Software V14 toutes versions | ||
| Siemens | N/A | SIMATIC PCS 7 V9.0 toutes versions | ||
| Siemens | N/A | SIMATIC PCS 7 V9.1 toutes versions | ||
| Siemens | N/A | SIMATIC S7-1500 TM MFP - BIOS | ||
| Siemens | N/A | SIMOTION D435-2 DP/PN (6AU1435-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SINAMICS SL150 versions antérieures à 7.2 | ||
| Siemens | N/A | SINAMICS PERFECT HARMONY GH180 6SR5 versions antérieures à 7.2 | ||
| Siemens | N/A | Teamcenter Visualization versions 13.2.x antérieures à 13.2.0.13 | ||
| Siemens | N/A | SIMOTION D435-2 DP (6AU1435-2AA00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMOTION P320-4 S (6AU1320-4DS66-3AG0) toutes versions | ||
| Siemens | N/A | SIMATIC WinCC versions antérieures à 8.0 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.2.x antérieures à 14.2.0.3 | ||
| Siemens | N/A | les contrôlleurs Desigo PX, se référer au bulletin ssa-824231 de l'éditeur pour la liste complète des versions affectées | ||
| Siemens | N/A | SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMATIC S7-PM toutes versions | ||
| Siemens | N/A | Solid Edge SE2023 versions antérieures à 223.0 Update 5 | ||
| Siemens | N/A | JT2Go versions antérieures à 14.1.0.4 | ||
| Siemens | N/A | SIMOTION D455-2 DP/PN (6AU1455-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | SIMOTION D410-2 DP/PN (6AU1410-2AD00-0AA0) versions antérieures à 5.5 SP1 | ||
| Siemens | N/A | Teamcenter Visualization versions 14.1.x antérieures à 14.1.0.8 | ||
| Siemens | N/A | CP-8031 MASTER MODULE (6MF2803-1AA00) versions antérieures à CPCI85 V05 | ||
| Siemens | N/A | Totally Integrated Automation Portal (TIA Portal) versions 14 à 18 | ||
| Siemens | N/A | SIMATIC PCS 7 toutes versions | ||
| Siemens | N/A | SIMOTION D425-2 DP/PN (6AU1425-2AD00-0AA0) versions antérieures à 5.5 SP1 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SINAMICS GL150 versions ant\u00e9rieures \u00e0 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 13.3.x ant\u00e9rieures \u00e0 13.3.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D425-2 DP (6AU1425-2AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP-8050 MASTER MODULE (6MF2805-0AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "POWER METER SICAM Q200 family versions ant\u00e9rieures \u00e0 2.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software V15 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA1) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D410-2 DP (6AU1410-2AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC STEP 7 V5 versions ant\u00e9rieures \u00e0 5.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION C240 (6AU1240-1AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 TM MFP - Linux Kernel",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAUT Software ST7sc toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION P320-4 E (6AU1320-4DE65-3AF0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.0.x ant\u00e9rieures \u00e0 14.0.0.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION C240 PN (6AU1240-1AB00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC NET PC Software V14 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V9.0 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 V9.1 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-1500 TM MFP - BIOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D435-2 DP/PN (6AU1435-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS SL150 versions ant\u00e9rieures \u00e0 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SINAMICS PERFECT HARMONY GH180 6SR5 versions ant\u00e9rieures \u00e0 7.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 13.2.x ant\u00e9rieures \u00e0 13.2.0.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D435-2 DP (6AU1435-2AA00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION P320-4 S (6AU1320-4DS66-3AG0) toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC WinCC versions ant\u00e9rieures \u00e0 8.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.2.x ant\u00e9rieures \u00e0 14.2.0.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "les contr\u00f4lleurs Desigo PX, se r\u00e9f\u00e9rer au bulletin ssa-824231 de l\u0027\u00e9diteur pour la liste compl\u00e8te des versions affect\u00e9es",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D445-2 DP/PN (6AU1445-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC S7-PM toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Solid Edge SE2023 versions ant\u00e9rieures \u00e0 223.0 Update 5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "JT2Go versions ant\u00e9rieures \u00e0 14.1.0.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D455-2 DP/PN (6AU1455-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D410-2 DP/PN (6AU1410-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Teamcenter Visualization versions 14.1.x ant\u00e9rieures \u00e0 14.1.0.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "CP-8031 MASTER MODULE (6MF2803-1AA00) versions ant\u00e9rieures \u00e0 CPCI85 V05",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Totally Integrated Automation Portal (TIA Portal) versions 14 \u00e0 18",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC PCS 7 toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMOTION D425-2 DP/PN (6AU1425-2AD00-0AA0) versions ant\u00e9rieures \u00e0 5.5 SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2021-42384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42384"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-42378",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42378"
},
{
"name": "CVE-2022-39190",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39190"
},
{
"name": "CVE-2022-42720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42720"
},
{
"name": "CVE-2021-42382",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42382"
},
{
"name": "CVE-2022-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47520"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2022-21233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21233"
},
{
"name": "CVE-2021-42376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42376"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2021-28831",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28831"
},
{
"name": "CVE-2023-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23454"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-20421",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20421"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2018-4834",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4834"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-47929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47929"
},
{
"name": "CVE-2022-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3628"
},
{
"name": "CVE-2021-42373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42373"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-42377",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42377"
},
{
"name": "CVE-2022-42329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42329"
},
{
"name": "CVE-2021-3998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2022-42703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42703"
},
{
"name": "CVE-2022-47518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47518"
},
{
"name": "CVE-2023-31238",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31238"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2021-42386",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42386"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2023-33919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33919"
},
{
"name": "CVE-2022-43750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43750"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3435"
},
{
"name": "CVE-2022-3169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3169"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2021-42380",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42380"
},
{
"name": "CVE-2023-33920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33920"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4662"
},
{
"name": "CVE-2021-42374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42374"
},
{
"name": "CVE-2023-33124",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33124"
},
{
"name": "CVE-2022-43545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43545"
},
{
"name": "CVE-2022-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3564"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2022-36280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36280"
},
{
"name": "CVE-2022-4129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4129"
},
{
"name": "CVE-2022-41218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41218"
},
{
"name": "CVE-2023-26495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26495"
},
{
"name": "CVE-2022-34918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34918"
},
{
"name": "CVE-2022-20572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20572"
},
{
"name": "CVE-2022-41849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41849"
},
{
"name": "CVE-2022-42432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42432"
},
{
"name": "CVE-2022-42896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42896"
},
{
"name": "CVE-2023-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0179"
},
{
"name": "CVE-2022-47946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47946"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2602"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2023-25910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25910"
},
{
"name": "CVE-2023-33921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33921"
},
{
"name": "CVE-2022-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4095"
},
{
"name": "CVE-2022-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2585"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-2078",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2078"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2022-41222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41222"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-2586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2586"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2023-26607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26607"
},
{
"name": "CVE-2022-3649",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3649"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2022-42719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42719"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-42379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42379"
},
{
"name": "CVE-2021-20269",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20269"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"name": "CVE-2023-23559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23559"
},
{
"name": "CVE-2022-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3524"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-2274",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2274"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2021-42381",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42381"
},
{
"name": "CVE-2022-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21505"
},
{
"name": "CVE-2022-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36123"
},
{
"name": "CVE-2022-3586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3586"
},
{
"name": "CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"name": "CVE-2022-41850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41850"
},
{
"name": "CVE-2022-2978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2978"
},
{
"name": "CVE-2022-3646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3646"
},
{
"name": "CVE-2022-3625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3625"
},
{
"name": "CVE-2022-42328",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42328"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2023-33122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33122"
},
{
"name": "CVE-2022-42721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42721"
},
{
"name": "CVE-2022-4378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4378"
},
{
"name": "CVE-2022-0547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0547"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43398"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3115"
},
{
"name": "CVE-2021-42383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42383"
},
{
"name": "CVE-2023-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1095"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-0171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0171"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2905"
},
{
"name": "CVE-2022-20422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20422"
},
{
"name": "CVE-2023-0394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0394"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-3303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3303"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2021-42385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42385"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2023-27465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27465"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2023-33121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33121"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2023-28829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28829"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-1077",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1077"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-30757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30757"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2022-42722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42722"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2022-20566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20566"
},
{
"name": "CVE-2022-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2327"
},
{
"name": "CVE-2022-1199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1199"
},
{
"name": "CVE-2022-3621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3621"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3606"
},
{
"name": "CVE-2022-1852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1852"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-40768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40768"
},
{
"name": "CVE-2022-4139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4139"
},
{
"name": "CVE-2022-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3521"
},
{
"name": "CVE-2022-3104",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3104"
},
{
"name": "CVE-2021-42375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42375"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2023-30897",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30897"
},
{
"name": "CVE-2022-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40307"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-30065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30065"
},
{
"name": "CVE-2022-41674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41674"
},
{
"name": "CVE-2022-1882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1882"
},
{
"name": "CVE-2022-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3635"
},
{
"name": "CVE-2022-43439",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43439"
},
{
"name": "CVE-2023-33123",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33123"
},
{
"name": "CVE-2023-30901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30901"
},
{
"name": "CVE-2022-43546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43546"
},
{
"name": "CVE-2022-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2153"
}
],
"initial_release_date": "2023-06-13T00:00:00",
"last_revision_date": "2023-06-14T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0453",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-06-13T00:00:00.000000"
},
{
"description": "Modification de la date du bulletin de s\u00e9curit\u00e9 ssa-824231.",
"revision_date": "2023-06-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-975766 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-975766.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-042050 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-042050.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-731916 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-731916.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-914026 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-914026.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-794697 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-538795 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-538795.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-831302 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831302.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-482956 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-482956.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-508677 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-508677.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-968170 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-968170.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-824231 du 24 janvier 2018",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-824231.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-942865 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-942865.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-887249 du 13 juin 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-887249.html"
}
]
}
CERTFR-2022-AVI-697
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2021-44879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44879"
},
{
"name": "CVE-2022-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21127"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2022-20132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20132"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-1651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1651"
},
{
"name": "CVE-2022-33741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33741"
},
{
"name": "CVE-2022-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
},
{
"name": "CVE-2022-33742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33742"
},
{
"name": "CVE-2022-34918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34918"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2022-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1998"
},
{
"name": "CVE-2022-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21499"
},
{
"name": "CVE-2022-33740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33740"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2021-45402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45402"
},
{
"name": "CVE-2022-0264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0264"
},
{
"name": "CVE-2022-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1972"
},
{
"name": "CVE-2022-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0494"
},
{
"name": "CVE-2021-33061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33061"
},
{
"name": "CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1734"
},
{
"name": "CVE-2022-26490",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26490"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-1671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1671"
},
{
"name": "CVE-2022-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
},
{
"name": "CVE-2021-4204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4204"
},
{
"name": "CVE-2022-29582",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29582"
},
{
"name": "CVE-2022-33743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33743"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-0617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0617"
},
{
"name": "CVE-2022-1852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1852"
},
{
"name": "CVE-2022-21180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21180"
},
{
"name": "CVE-2022-26365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26365"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2022-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23222"
},
{
"name": "CVE-2022-1198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1198"
},
{
"name": "CVE-2022-1508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1508"
}
],
"initial_release_date": "2022-08-02T00:00:00",
"last_revision_date": "2022-08-02T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-697",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222615-1 du 01 ao\u00fbt 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222615-1/"
}
]
}
CERTFR-2022-AVI-851
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données, un contournement de la politique de sécurité et une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-33741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33741"
},
{
"name": "CVE-2022-33742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33742"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-33740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33740"
},
{
"name": "CVE-2021-33061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33061"
},
{
"name": "CVE-2022-34494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34494"
},
{
"name": "CVE-2022-33744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33744"
},
{
"name": "CVE-2022-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1943"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2022-33743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33743"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-34495",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34495"
},
{
"name": "CVE-2022-1852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1852"
},
{
"name": "CVE-2022-1973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1973"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-26365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26365"
}
],
"initial_release_date": "2022-09-23T00:00:00",
"last_revision_date": "2022-09-23T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 21 sept. 2022",
"url": "https://ubuntu.com/security/notices/USN-5633-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 21 sept. 2022",
"url": "https://ubuntu.com/security/notices/USN-5623-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 21 sept. 2022",
"url": "https://ubuntu.com/security/notices/USN-5630-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 21 sept. 2022",
"url": "https://ubuntu.com/security/notices/USN-5622-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 21 sept. 2022",
"url": "https://ubuntu.com/security/notices/USN-5624-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 21 sept. 2022",
"url": "https://ubuntu.com/security/notices/USN-5621-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 21 sept. 2022",
"url": "https://ubuntu.com/security/notices/USN-5634-1"
}
],
"reference": "CERTFR-2022-AVI-851",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-09-23T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, un contournement de la politique de\ns\u00e9curit\u00e9 et une ex\u00e9cution de code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5633-1 du 21 sept. 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5630-1 du 21 sept. 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5621-1 du 21 sept. 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5634-1 du 21 sept. 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5622-1 du 21 sept. 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5624-1 du 21 sept. 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5623-1 du 21 sept. 2022",
"url": null
}
]
}
CERTFR-2022-AVI-629
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 7.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-20132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20132"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2022-33741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33741"
},
{
"name": "CVE-2022-33742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33742"
},
{
"name": "CVE-2022-34918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34918"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2022-33740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33740"
},
{
"name": "CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-26365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26365"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
}
],
"initial_release_date": "2022-07-13T00:00:00",
"last_revision_date": "2022-07-13T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-629",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nun contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222377-1 du 12 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222377-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222376-1 du 12 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222376-1/"
}
]
}
CERTFR-2023-AVI-0526
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Siemens | N/A | SIMATIC MV540 H (6GF3540-0GE10) versions antérieures à 3.3.4 | ||
| Siemens | N/A | SIMATIC MV560 X (6GF3560-0HE10) versions antérieures à 3.3.4 | ||
| Siemens | N/A | RUGGEDCOM ROX RX5000 versions antérieures à 2.16.0 | ||
| Siemens | N/A | RUGGEDCOM ROX MX5000 versions antérieures à 2.16.0 | ||
| Siemens | N/A | Tecnomatix Plant Simulation versions 2302.x antérieures à 2302.0002 | ||
| Siemens | N/A | SIMATIC MV540 S (6GF3540-0CD10) versions antérieures à 3.3.4 | ||
| Siemens | N/A | RUGGEDCOM ROX RX1512 versions antérieures à 2.16.0 | ||
| Siemens | N/A | RUGGEDCOM ROX RX1501 versions antérieures à 2.16.0 | ||
| Siemens | N/A | SIMATIC MV550 H (6GF3550-0GE10) versions antérieures à 3.3.4 | ||
| Siemens | N/A | RUGGEDCOM ROX RX1524 versions antérieures à 2.16.0 | ||
| Siemens | N/A | SIMATIC MV550 S (6GF3550-0CD10) versions antérieures à 3.3.4 | ||
| Siemens | N/A | SIMATIC MV560 U (6GF3560-0LE10) versions antérieures à 3.3.4 | ||
| Siemens | N/A | RUGGEDCOM ROX RX1536 versions antérieures à 2.16.0 | ||
| Siemens | N/A | RUGGEDCOM ROX RX1400 versions antérieures à 2.16.0 | ||
| Siemens | N/A | SIMATIC CN 4100 versions antérieures à 2.5 | ||
| Siemens | N/A | RUGGEDCOM ROX RX1511 versions antérieures à 2.16.0 | ||
| Siemens | N/A | RUGGEDCOM ROX RX1500 versions antérieures à 2.16.0 | ||
| Siemens | N/A | RUGGEDCOM ROX RX1510 versions antérieures à 2.16.0 | ||
| Siemens | N/A | Tecnomatix Plant Simulation versions 2201.x antérieures à 2201.0008 | ||
| Siemens | N/A | SiPass integrated versions antérieures à 2.90.3.8 | ||
| Siemens | N/A | RUGGEDCOM ROX MX5000RE versions antérieures à 2.16.0 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SIMATIC MV540 H (6GF3540-0GE10) versions ant\u00e9rieures \u00e0 3.3.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC MV560 X (6GF3560-0HE10) versions ant\u00e9rieures \u00e0 3.3.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM ROX RX5000 versions ant\u00e9rieures \u00e0 2.16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM ROX MX5000 versions ant\u00e9rieures \u00e0 2.16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Tecnomatix Plant Simulation versions 2302.x ant\u00e9rieures \u00e0 2302.0002",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC MV540 S (6GF3540-0CD10) versions ant\u00e9rieures \u00e0 3.3.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM ROX RX1512 versions ant\u00e9rieures \u00e0 2.16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM ROX RX1501 versions ant\u00e9rieures \u00e0 2.16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC MV550 H (6GF3550-0GE10) versions ant\u00e9rieures \u00e0 3.3.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM ROX RX1524 versions ant\u00e9rieures \u00e0 2.16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC MV550 S (6GF3550-0CD10) versions ant\u00e9rieures \u00e0 3.3.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC MV560 U (6GF3560-0LE10) versions ant\u00e9rieures \u00e0 3.3.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM ROX RX1536 versions ant\u00e9rieures \u00e0 2.16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM ROX RX1400 versions ant\u00e9rieures \u00e0 2.16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SIMATIC CN 4100 versions ant\u00e9rieures \u00e0 2.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM ROX RX1511 versions ant\u00e9rieures \u00e0 2.16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM ROX RX1500 versions ant\u00e9rieures \u00e0 2.16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM ROX RX1510 versions ant\u00e9rieures \u00e0 2.16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "Tecnomatix Plant Simulation versions 2201.x ant\u00e9rieures \u00e0 2201.0008",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "SiPass integrated versions ant\u00e9rieures \u00e0 2.90.3.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "RUGGEDCOM ROX MX5000RE versions ant\u00e9rieures \u00e0 2.16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-36751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36751"
},
{
"name": "CVE-2023-37247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37247"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-36755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36755"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2023-36753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36753"
},
{
"name": "CVE-2023-36749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36749"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-48285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48285"
},
{
"name": "CVE-2023-36390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36390"
},
{
"name": "CVE-2023-37376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37376"
},
{
"name": "CVE-2023-36389",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36389"
},
{
"name": "CVE-2023-36750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36750"
},
{
"name": "CVE-2023-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29131"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2023-36521",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36521"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2023-35920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35920"
},
{
"name": "CVE-2023-29130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29130"
},
{
"name": "CVE-2022-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29562"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2019-14196",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14196"
},
{
"name": "CVE-2023-35921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35921"
},
{
"name": "CVE-2023-36754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36754"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2023-36752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36752"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-36386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36386"
},
{
"name": "CVE-2023-37374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37374"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2023-37375",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37375"
},
{
"name": "CVE-2022-29561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29561"
},
{
"name": "CVE-2022-30767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30767"
},
{
"name": "CVE-2023-36748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36748"
},
{
"name": "CVE-2023-37248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37248"
},
{
"name": "CVE-2022-31810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31810"
},
{
"name": "CVE-2023-37246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37246"
},
{
"name": "CVE-2022-24903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24903"
}
],
"initial_release_date": "2023-07-11T00:00:00",
"last_revision_date": "2023-07-11T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0526",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-07-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-764801 du 11 juillet 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-764801.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-561322 du 11 juillet 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-561322.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-313488 du 11 juillet 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-313488.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-924149 du 11 juillet 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-924149.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-146325 du 11 juillet 2023",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-146325.html"
}
]
}
CERTFR-2022-AVI-698
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.3 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Oracle | Virtualization | Red Hat Virtualization Host 4 for RHEL 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.6 ppc64le |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - AUS 7.3 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.4 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 8 x86_64",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.6 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
}
],
"initial_release_date": "2022-08-02T00:00:00",
"last_revision_date": "2022-08-02T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-698",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2022:5805 du 2 ao\u00fbt 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5805"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2022:5819 du 2 ao\u00fbt 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5819"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2022:5806 du 2 ao\u00fbt 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5806"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2022:5802 du 2 ao\u00fbt 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5802"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2022:5834 du 2 ao\u00fbt 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5834"
}
]
}
CERTFR-2022-AVI-584
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21127"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0168"
},
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2022-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1972"
},
{
"name": "CVE-2019-19377",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19377"
},
{
"name": "CVE-2021-33061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33061"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"name": "CVE-2022-20008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20008"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-21180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21180"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
}
],
"initial_release_date": "2022-06-27T00:00:00",
"last_revision_date": "2022-06-27T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-584",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222177-1 du 23 juin 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222177-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222172-1 du 23 juin 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222172-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222173-1 du 23 juin 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222173-1/"
}
]
}
CERTFR-2022-AVI-946
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-33741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33741"
},
{
"name": "CVE-2022-33742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33742"
},
{
"name": "CVE-2022-33740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33740"
},
{
"name": "CVE-2022-0812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0812"
},
{
"name": "CVE-2022-33744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33744"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2022-26365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26365"
}
],
"initial_release_date": "2022-10-24T00:00:00",
"last_revision_date": "2022-10-24T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-946",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de\nservice \u00e0 distance et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5695-1 du 21 octobre 2022",
"url": "https://ubuntu.com/security/notices/USN-5695-1"
}
]
}
CERTFR-2022-AVI-801
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33656"
},
{
"name": "CVE-2021-33061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33061"
},
{
"name": "CVE-2022-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1943"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-1852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1852"
},
{
"name": "CVE-2022-1973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1973"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
}
],
"initial_release_date": "2022-09-07T00:00:00",
"last_revision_date": "2022-09-07T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-801",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-09-07T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5597-1 du 06 septembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5597-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5600-1 du 06 septembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5600-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5599-1 du 06 septembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5599-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5598-1 du 06 septembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5598-1"
}
]
}
CERTFR-2022-AVI-670
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP4 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2021-44879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44879"
},
{
"name": "CVE-2022-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1116"
},
{
"name": "CVE-2022-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21127"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2022-20132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20132"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2017-16525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16525"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-1651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1651"
},
{
"name": "CVE-2022-33741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33741"
},
{
"name": "CVE-2022-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
},
{
"name": "CVE-2022-33742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33742"
},
{
"name": "CVE-2022-34918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34918"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2022-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1998"
},
{
"name": "CVE-2022-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21499"
},
{
"name": "CVE-2022-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1462"
},
{
"name": "CVE-2022-33740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33740"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"name": "CVE-2021-45402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45402"
},
{
"name": "CVE-2022-0264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0264"
},
{
"name": "CVE-2022-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1972"
},
{
"name": "CVE-2022-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0494"
},
{
"name": "CVE-2021-33061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33061"
},
{
"name": "CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1734"
},
{
"name": "CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"name": "CVE-2022-26490",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26490"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-1671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1671"
},
{
"name": "CVE-2022-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
},
{
"name": "CVE-2021-4204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4204"
},
{
"name": "CVE-2022-29582",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29582"
},
{
"name": "CVE-2021-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39698"
},
{
"name": "CVE-2022-33743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33743"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-0617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0617"
},
{
"name": "CVE-2022-1852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1852"
},
{
"name": "CVE-2022-21180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21180"
},
{
"name": "CVE-2022-26365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26365"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2022-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23222"
},
{
"name": "CVE-2022-1198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1198"
},
{
"name": "CVE-2022-1508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1508"
}
],
"initial_release_date": "2022-07-22T00:00:00",
"last_revision_date": "2022-07-22T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-670",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-22T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222461-1 du 20 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222461-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222482-1 du 21 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222482-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222460-1 du 20 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222460-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222443-1 du 19 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222443-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222520-1 du 21 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222520-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222515-1 du 21 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222515-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222438-1 du 19 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222438-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222516-1 du 21 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222516-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222435-1 du 19 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222435-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222444-1 du 19 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222444-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222478-1 du 21 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222478-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222445-1 du 19 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222445-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222446-1 du 19 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222446-1/"
}
]
}
CERTFR-2022-AVI-606
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian \"Buster\" versions ant\u00e9rieures \u00e0 4.19.249-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-29581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29581"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1195"
},
{
"name": "CVE-2022-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28356"
},
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"name": "CVE-2022-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
},
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2022-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1048"
},
{
"name": "CVE-2022-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0494"
},
{
"name": "CVE-2022-0812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0812"
},
{
"name": "CVE-2022-32250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32250"
},
{
"name": "CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1734"
},
{
"name": "CVE-2022-26490",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26490"
},
{
"name": "CVE-2022-1419",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1419"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2022-28389",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28389"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-1199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1199"
},
{
"name": "CVE-2022-1204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1204"
},
{
"name": "CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"name": "CVE-2022-28390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28390"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2022-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1516"
},
{
"name": "CVE-2022-1198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1198"
},
{
"name": "CVE-2022-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2153"
}
],
"initial_release_date": "2022-07-04T00:00:00",
"last_revision_date": "2022-07-04T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-606",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nDebian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian dsa-5173 du 03 juillet 2022",
"url": "https://www.debian.org/security/2022/dsa-5173"
}
]
}
CERTFR-2022-AVI-688
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 7.1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-20132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20132"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2022-34918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34918"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
}
],
"initial_release_date": "2022-07-29T00:00:00",
"last_revision_date": "2022-07-29T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-688",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nun contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222549-1 du 26 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222549-1/"
}
]
}
CERTFR-2022-AVI-588
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de RedHat. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for ARM 64 9 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Scientific Computing 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 7 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems 9 s390x | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian 7 ppc64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0 s390x | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le | ||
| Oracle | Virtualization | Red Hat Virtualization Host 4 for RHEL 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian 9 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for x86_64 9 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 9 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - TUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 9 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for ARM 64 9 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Scientific Computing 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time - Telecommunications Update Service 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 7 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems 9 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.2 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0 s390x",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 for RHEL 7 x86_64",
"product": {
"name": "Virtualization",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian 9 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for x86_64 9 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 9 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-29368",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29368"
},
{
"name": "CVE-2020-28915",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28915"
},
{
"name": "CVE-2022-27666",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27666"
},
{
"name": "CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
}
],
"initial_release_date": "2022-06-29T00:00:00",
"last_revision_date": "2022-06-29T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-588",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRedHat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service,\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de RedHat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2022:5316 du 28 juin 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5316"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2022:5224 du 28 juin 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5224"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2022:5232 du 28 juin 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5232"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2022:5249 du 28 juin 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2022:5267 du 28 juin 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2022:5344 du 28 juin 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5344"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2022:5236 du 28 juin 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5236"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2022:5220 du 28 juin 2022",
"url": "https://access.redhat.com/errata/RHSA-2022:5220"
}
]
}
CERTFR-2022-AVI-542
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian stable (bullseye) versions ant\u00e9rieures \u00e0 5.10.120-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21499"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-28893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28893"
},
{
"name": "CVE-2022-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1972"
},
{
"name": "CVE-2022-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0494"
},
{
"name": "CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1786"
},
{
"name": "CVE-2022-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1789"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-1852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1852"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
}
],
"initial_release_date": "2022-06-13T00:00:00",
"last_revision_date": "2022-06-13T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-542",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nDebian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service\net une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian dsa-5161 du 11 juin 2022",
"url": "https://www.debian.org/security/2022/dsa-5161"
}
]
}
CERTFR-2022-AVI-527
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1195"
},
{
"name": "CVE-2022-30787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30787"
},
{
"name": "CVE-2022-28356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28356"
},
{
"name": "CVE-2022-30784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30784"
},
{
"name": "CVE-2022-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23037"
},
{
"name": "CVE-2022-23042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23042"
},
{
"name": "CVE-2022-1651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1651"
},
{
"name": "CVE-2022-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0168"
},
{
"name": "CVE-2022-30783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30783"
},
{
"name": "CVE-2022-30786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30786"
},
{
"name": "CVE-2022-23036",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23036"
},
{
"name": "CVE-2022-30789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30789"
},
{
"name": "CVE-2022-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1016"
},
{
"name": "CVE-2022-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23038"
},
{
"name": "CVE-2022-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21499"
},
{
"name": "CVE-2022-30788",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30788"
},
{
"name": "CVE-2022-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26966"
},
{
"name": "CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"name": "CVE-2022-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1048"
},
{
"name": "CVE-2022-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1972"
},
{
"name": "CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"name": "CVE-2022-23039",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23039"
},
{
"name": "CVE-2022-23040",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23040"
},
{
"name": "CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-23041",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23041"
},
{
"name": "CVE-2022-24958",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24958"
},
{
"name": "CVE-2022-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1734"
},
{
"name": "CVE-2022-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1836"
},
{
"name": "CVE-2022-1419",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1419"
},
{
"name": "CVE-2022-1671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1671"
},
{
"name": "CVE-2022-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2022-28389",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28389"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2021-4149",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4149"
},
{
"name": "CVE-2022-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1158"
},
{
"name": "CVE-2022-1199",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1199"
},
{
"name": "CVE-2022-1204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1204"
},
{
"name": "CVE-2022-29968",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29968"
},
{
"name": "CVE-2021-46790",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46790"
},
{
"name": "CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"name": "CVE-2022-28390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28390"
},
{
"name": "CVE-2022-1263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1263"
},
{
"name": "CVE-2022-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1516"
},
{
"name": "CVE-2022-1198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1198"
},
{
"name": "CVE-2022-30785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30785"
}
],
"initial_release_date": "2022-06-08T00:00:00",
"last_revision_date": "2022-06-08T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-527",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5467-1 du 08 juin 2022",
"url": "https://ubuntu.com/security/notices/USN-5467-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5471-1 du 08 juin 2022",
"url": "https://ubuntu.com/security/notices/USN-5471-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5463-1 du 07 juin 2022",
"url": "https://ubuntu.com/security/notices/USN-5463-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5470-1 du 08 juin 2022",
"url": "https://ubuntu.com/security/notices/USN-5470-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5468-1 du 08 juin 2022",
"url": "https://ubuntu.com/security/notices/USN-5468-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5469-1 du 08 juin 2022",
"url": "https://ubuntu.com/security/notices/USN-5469-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5465-1 du 08 juin 2022",
"url": "https://ubuntu.com/security/notices/USN-5465-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5466-1 du 08 juin 2022",
"url": "https://ubuntu.com/security/notices/USN-5466-1"
}
]
}
CERTFR-2022-AVI-789
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service, une élévation de priviliège et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-33656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33656"
},
{
"name": "CVE-2021-33061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33061"
},
{
"name": "CVE-2022-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1943"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-1852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1852"
},
{
"name": "CVE-2022-1973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1973"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
}
],
"initial_release_date": "2022-09-02T00:00:00",
"last_revision_date": "2022-09-02T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 01 sept. 2022",
"url": "https://ubuntu.com/security/notices/USN-5591-3"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 01 sept. 2022",
"url": "https://ubuntu.com/security/notices/USN-5591-2"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 02 sept. 2022",
"url": "https://ubuntu.com/security/notices/USN-5592-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 31 ao\u00fbt 2022",
"url": "https://ubuntu.com/security/notices/USN-5591-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 31 ao\u00fbt 2022",
"url": "https://ubuntu.com/security/notices/USN-5594-1"
}
],
"reference": "CERTFR-2022-AVI-789",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-09-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de\nservice, une \u00e9l\u00e9vation de privili\u00e8ge et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5591-1 du 31 ao\u00fbt 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5592-1 du 02 sept. 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5591-2 du 01 sept. 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5591-3 du 01 sept. 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5594-1 du 31 ao\u00fbt 2022",
"url": null
}
]
}
CERTFR-2022-AVI-919
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 16.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-33741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33741"
},
{
"name": "CVE-2022-3176",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3176"
},
{
"name": "CVE-2022-33742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33742"
},
{
"name": "CVE-2022-33740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33740"
},
{
"name": "CVE-2022-0812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0812"
},
{
"name": "CVE-2022-33744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33744"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2021-4159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4159"
},
{
"name": "CVE-2022-26365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26365"
}
],
"initial_release_date": "2022-10-14T00:00:00",
"last_revision_date": "2022-10-14T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-919",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5678-1 du 13 octobre 2022",
"url": "https://ubuntu.com/security/notices/USN-5678-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5679-1 du 13 octobre 2022",
"url": "https://ubuntu.com/security/notices/USN-5679-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5677-1 du 13 octobre 2022",
"url": "https://ubuntu.com/security/notices/USN-5677-1"
}
]
}
CERTFR-2022-AVI-652
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 7 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 6 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 7.1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | N/A | SUSE Enterprise Storage 7 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP2 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-LTSS | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 15-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-20132",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20132"
},
{
"name": "CVE-2022-29900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29900"
},
{
"name": "CVE-2022-29901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29901"
},
{
"name": "CVE-2022-33741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33741"
},
{
"name": "CVE-2022-33742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33742"
},
{
"name": "CVE-2022-34918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34918"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2022-33740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33740"
},
{
"name": "CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-20141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20141"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2021-26341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26341"
},
{
"name": "CVE-2022-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1679"
},
{
"name": "CVE-2022-26365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26365"
},
{
"name": "CVE-2022-33981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33981"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
}
],
"initial_release_date": "2022-07-18T00:00:00",
"last_revision_date": "2022-07-18T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-652",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-2022:2411-1 du 15 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222411-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-2022:2407-1 du 15 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222407-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-2022:2423-1 du 18 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222423-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-2022:2422-1 du 18 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222422-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-2022:2424-1 du 18 juillet 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222424-1/"
}
]
}
CERTFR-2022-AVI-895
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39189"
},
{
"name": "CVE-2022-33741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33741"
},
{
"name": "CVE-2022-3176",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3176"
},
{
"name": "CVE-2022-33742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33742"
},
{
"name": "CVE-2022-33740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33740"
},
{
"name": "CVE-2022-0812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0812"
},
{
"name": "CVE-2022-33744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33744"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2021-4159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4159"
},
{
"name": "CVE-2022-26365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26365"
},
{
"name": "CVE-2022-1882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1882"
}
],
"initial_release_date": "2022-10-11T00:00:00",
"last_revision_date": "2022-10-11T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-895",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5669-1 du 10 octobre 2022",
"url": "https://ubuntu.com/security/notices/USN-5669-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5667-1 du 10 octobre 2022",
"url": "https://ubuntu.com/security/notices/USN-5667-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5668-1 du 10 octobre 2022",
"url": "https://ubuntu.com/security/notices/USN-5668-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5669-2 du 10 octobre 2022",
"url": "https://ubuntu.com/security/notices/USN-5669-2"
}
]
}
CERTFR-2022-AVI-883
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données, un contournement de la politique de sécurité et une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2022-33741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33741"
},
{
"name": "CVE-2022-33742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33742"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-33740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33740"
},
{
"name": "CVE-2022-34494",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34494"
},
{
"name": "CVE-2022-33744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33744"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-2318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2318"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-33743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33743"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-34495",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34495"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
},
{
"name": "CVE-2022-26365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26365"
}
],
"initial_release_date": "2022-10-05T00:00:00",
"last_revision_date": "2022-10-05T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 04 octobre 2022",
"url": "https://ubuntu.com/security/notices/USN-5654-1"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 04 octobre 2022",
"url": "https://ubuntu.com/security/notices/USN-5655-1"
}
],
"reference": "CERTFR-2022-AVI-883",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, un contournement de la politique de\ns\u00e9curit\u00e9 et une ex\u00e9cution de code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5654-1 du 04 octobre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5655-1 du 04 octobre 2022",
"url": null
}
]
}
CERTFR-2022-AVI-857
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une élévation de privilèges, un contournement de la politique de sécurité, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time Extension 12-SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE Linux Enterprise Storage 6 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-29581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29581"
},
{
"name": "CVE-2022-2977",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2977"
},
{
"name": "CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2022-2639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2639"
},
{
"name": "CVE-2020-36516",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36516"
},
{
"name": "CVE-2022-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2663"
},
{
"name": "CVE-2022-39188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39188"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
},
{
"name": "CVE-2022-26373",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26373"
},
{
"name": "CVE-2022-36879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36879"
},
{
"name": "CVE-2022-2588",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2588"
},
{
"name": "CVE-2021-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39698"
},
{
"name": "CVE-2022-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20369"
},
{
"name": "CVE-2022-21385",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21385"
},
{
"name": "CVE-2022-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3028"
}
],
"initial_release_date": "2022-09-28T00:00:00",
"last_revision_date": "2022-09-28T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 26 septembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223412-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 27 septembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223432-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 27 septembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223433-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 26 septembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223411-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 27\u00a0septembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223424-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 26\u00a0septembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223409-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 27 septembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223422-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 26 septembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223406-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 26 septembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223415-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 26 septembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223407-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 27 septembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223445-1/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE du 26\u00a0septembre 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223408-1/"
}
],
"reference": "CERTFR-2022-AVI-857",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-09-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un contournement de\nla politique de s\u00e9curit\u00e9, un d\u00e9ni de service et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3445-1 du 27 septembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3411-1 du 26 septembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3406-1 du 26 septembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3433-1 du 27 septembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3408-1 du 26 septembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3407-1 du 26 septembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3432-1 du 27 septembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3415-1 du 26 septembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3422-1 du 27 septembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3412-1 du 26 septembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3409-1 du 26 septembre 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2022:3424-1 du 27 septembre 2022",
"url": null
}
]
}
CERTFR-2022-AVI-867
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité, une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2021-33655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33655"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36946"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
}
],
"initial_release_date": "2022-09-30T00:00:00",
"last_revision_date": "2022-09-30T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 28 septembre 2022",
"url": "https://ubuntu.com/security/notices/USN-5647-1"
}
],
"reference": "CERTFR-2022-AVI-867",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-09-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un\ncontournement de la politique de s\u00e9curit\u00e9, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5647-1 du 28 septembre 2022",
"url": null
}
]
}
CERTFR-2022-AVI-828
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité, une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-32296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32296"
},
{
"name": "CVE-2021-33061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33061"
},
{
"name": "CVE-2022-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1943"
},
{
"name": "CVE-2022-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1012"
},
{
"name": "CVE-2022-2873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2873"
},
{
"name": "CVE-2022-2959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2959"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-1852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1852"
},
{
"name": "CVE-2022-1973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1973"
},
{
"name": "CVE-2022-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2503"
}
],
"initial_release_date": "2022-09-19T00:00:00",
"last_revision_date": "2022-09-19T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu du 16 sept. 2022",
"url": "https://ubuntu.com/security/notices/USN-5616-1"
}
],
"reference": "CERTFR-2022-AVI-828",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-09-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux d\u0027Ubuntu\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un contournement de la politique de s\u00e9curit\u00e9, une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5616-1 du 16 sept. 2022",
"url": null
}
]
}
opensuse-su-2022:2549-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-29900, CVE-2022-29901: Fixed the RETBLEED attack, a new Spectre like Branch Target Buffer attack, that can leak arbitrary kernel information (bsc#1199657).\n- CVE-2022-34918: Fixed a buffer overflow with nft_set_elem_init() that could be used by a local attacker to escalate privileges (bnc#1201171).\n- CVE-2021-26341: Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage (bsc#1201050).\n- CVE-2022-1679: Fixed a use-after-free in the Atheros wireless driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages (bsc#1199487).\n- CVE-2022-20132: Fixed out of bounds read due to improper input validation in lg_probe and related functions of hid-lg.c (bsc#1200619).\n- CVE-2022-1012: Fixed information leak caused by small table perturb size in the TCP source port generation algorithm (bsc#1199482).\n- CVE-2022-33981: Fixed use-after-free in floppy driver (bsc#1200692)\n- CVE-2022-20141: Fixed a possible use after free due to improper locking in ip_check_mc_rcu() (bsc#1200604).\n- CVE-2021-4157: Fixed an out of memory bounds write flaw in the NFS subsystem, related to the replication of files with NFS. A user could potentially crash the system or escalate privileges on the system (bsc#1194013).\n- CVE-2022-20154: Fixed a use after free due to a race condition in lock_sock_nested of sock.c. This could lead to local escalation of privilege with System execution privileges needed (bsc#1200599).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda/conexant: Fix missing beep setup (git-fixes).\n- ALSA: hda/realtek - Add HW8326 support (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo PD70PNT (git-fixes).\n- ALSA: hda/realtek - ALC897 headset MIC no sound (git-fixes).\n- ALSA: hda/via: Fix missing beep setup (git-fixes).\n- arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399 (git-fixes)\n- arm64: ftrace: fix branch range checks (git-fixes)\n- ASoC: cs35l36: Update digital volume TLV (git-fixes).\n- ASoC: cs42l52: Correct TLV for Bypass Volume (git-fixes).\n- ASoC: cs42l52: Fix TLV scales for mixer controls (git-fixes).\n- ASoC: cs42l56: Correct typo in minimum level for SX volume controls (git-fixes).\n- ASoC: cs53l30: Correct number of volume levels on SX controls (git-fixes).\n- ASoC: es8328: Fix event generation for deemphasis control (git-fixes).\n- ASoC: nau8822: Add operation for internal PLL off and on (git-fixes).\n- ASoC: wm8962: Fix suspend while playing music (git-fixes).\n- ASoC: wm_adsp: Fix event generation for wm_adsp_fw_put() (git-fixes).\n- ata: libata: add qc-\u003eflags in ata_qc_complete_template tracepoint (git-fixes).\n- ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo() (git-fixes).\n- bcache: avoid journal no-space deadlock by reserving 1 journal bucket (git-fixes).\n- bcache: avoid unnecessary soft lockup in kworker update_writeback_rate() (bsc#1197362).\n- bcache: fixup multiple threads crash (git-fixes).\n- bcache: improve multithreaded bch_btree_check() (git-fixes).\n- bcache: improve multithreaded bch_sectors_dirty_init() (git-fixes).\n- bcache: memset on stack variables in bch_btree_check() and bch_sectors_dirty_init() (git-fixes).\n- bcache: remove incremental dirty sector counting for bch_sectors_dirty_init() (git-fixes).\n- bio: fix page leak bio_add_hw_page failure (git-fixes).\n- blk-cgroup: fix a hd_struct leak in blkcg_fill_root_iostats (git-fixes).\n- blk-iolatency: Fix inflight count imbalances and IO hangs on offline (bsc#1200825).\n- blk-mq: clear active_queues before clearing BLK_MQ_F_TAG_QUEUE_SHARED (bsc#1200263).\n- blk-mq: do not update io_ticks with passthrough requests (bsc#1200816).\n- blk-mq: drop workarounds for cpu hotplug queue management (bsc#1185762) \n- blk-mq: update hctx-\u003edispatch_busy in case of real scheduler (git-fixes).\n- block: advance iov_iter on bio_add_hw_page failure (git-fixes).\n- block: do not merge across cgroup boundaries if blkcg is enabled (bsc#1198020).\n- block: Fix handling of offline queues in blk_mq_alloc_request_hctx() (bsc#1185762).\n- block: Fix kABI in blk-merge.c (bsc#1198020).\n- block/keyslot-manager: prevent crash when num_slots=1 (git-fixes).\n- bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (git-fixes).\n- caif_virtio: fix race between virtio_device_ready() and ndo_open() (git-fixes).\n- ceph: add some lockdep assertions around snaprealm handling (bsc#1201147).\n- ceph: clean up locking annotation for ceph_get_snap_realm and __lookup_snap_realm (bsc#1201149).\n- certs/blacklist_hashes.c: fix const confusion in certs blacklist (git-fixes).\n- cifs: add WARN_ON for when chan_count goes below minimum (bsc#1200217).\n- cifs: adjust DebugData to use chans_need_reconnect for conn status (bsc#1200217).\n- cifs: alloc_path_with_tree_prefix: do not append sep. if the path is empty (bsc#1200217).\n- cifs: avoid parallel session setups on same channel (bsc#1200217).\n- cifs: avoid race during socket reconnect between send and recv (bsc#1200217).\n- cifs: call cifs_reconnect when a connection is marked (bsc#1200217).\n- cifs: call helper functions for marking channels for reconnect (bsc#1200217).\n- cifs: change smb2_query_info_compound to use a cached fid, if available (bsc#1200217).\n- cifs: check for smb1 in open_cached_dir() (bsc#1200217).\n- cifs: check reconnects for channels of active tcons too (bsc#1200217).\n- cifs: Check the IOCB_DIRECT flag, not O_DIRECT (bsc#1200217).\n- cifs: cifs_ses_mark_for_reconnect should also update reconnect bits (bsc#1200217).\n- cifs: clean up an inconsistent indenting (bsc#1200217).\n- cifs: destage any unwritten data to the server before calling copychunk_write (bsc#1200217).\n- cifs: do not build smb1ops if legacy support is disabled (bsc#1200217).\n- cifs: do not call cifs_dfs_query_info_nonascii_quirk() if nodfs was set (bsc#1200217).\n- cifs: do not use tcpStatus after negotiate completes (bsc#1200217).\n- cifs: do not use uninitialized data in the owner/group sid (bsc#1200217).\n- cifs: fix confusing unneeded warning message on smb2.1 and earlier (bsc#1200217).\n- cifs: fix double free race when mount fails in cifs_get_root() (bsc#1200217).\n- cifs: fix FILE_BOTH_DIRECTORY_INFO definition (bsc#1200217).\n- cifs: fix handlecache and multiuser (bsc#1200217).\n- cifs: fix hang on cifs_get_next_mid() (bsc#1200217).\n- cifs: fix incorrect use of list iterator after the loop (bsc#1200217).\n- cifs: fix minor compile warning (bsc#1200217).\n- cifs: fix missed refcounting of ipc tcon (bsc#1200217).\n- cifs: fix ntlmssp auth when there is no key exchange (bsc#1200217).\n- cifs: fix NULL ptr dereference in refresh_mounts() (bsc#1200217).\n- cifs: fix potential deadlock in direct reclaim (bsc#1200217).\n- cifs: fix potential double free during failed mount (bsc#1200217).\n- cifs: fix potential race with cifsd thread (bsc#1200217).\n- cifs: fix set of group SID via NTSD xattrs (bsc#1200217).\n- cifs: fix signed integer overflow when fl_end is OFFSET_MAX (bsc#1200217).\n- cifs: Fix smb311_update_preauth_hash() kernel-doc comment (bsc#1200217).\n- cifs: fix the cifs_reconnect path for DFS (bsc#1200217).\n- cifs: fix the connection state transitions with multichannel (bsc#1200217).\n- cifs: fix uninitialized pointer in error case in dfs_cache_get_tgt_share (bsc#1200217).\n- cifs: fix workstation_name for multiuser mounts (bsc#1200217).\n- cifs: force new session setup and tcon for dfs (bsc#1200217).\n- cifs: free ntlmsspblob allocated in negotiate (bsc#1200217).\n- cifs: ignore resource_id while getting fscache super cookie (bsc#1200217).\n- cifs: maintain a state machine for tcp/smb/tcon sessions (bsc#1200217).\n- cifs: make status checks in version independent callers (bsc#1200217).\n- cifs: mark sessions for reconnection in helper function (bsc#1200217).\n- cifs: modefromsids must add an ACE for authenticated users (bsc#1200217).\n- cifs: move definition of cifs_fattr earlier in cifsglob.h (bsc#1200217).\n- cifs: move superblock magic defitions to magic.h (bsc#1200217).\n- cifs: potential buffer overflow in handling symlinks (bsc#1200217).\n- cifs: print TIDs as hex (bsc#1200217).\n- cifs: protect all accesses to chan_* with chan_lock (bsc#1200217).\n- cifs: quirk for STATUS_OBJECT_NAME_INVALID returned for non-ASCII dfs refs (bsc#1200217).\n- cifs: reconnect only the connection and not smb session where possible (bsc#1200217).\n- cifs: release cached dentries only if mount is complete (bsc#1200217).\n- cifs: remove check of list iterator against head past the loop body (bsc#1200217).\n- cifs: remove redundant assignment to pointer p (bsc#1200217).\n- cifs: remove repeated debug message on cifs_put_smb_ses() (bsc#1200217).\n- cifs: remove repeated state change in dfs tree connect (bsc#1200217).\n- cifs: remove unused variable ses_selected (bsc#1200217).\n- cifs: return ENOENT for DFS lookup_cache_entry() (bsc#1200217).\n- cifs: return the more nuanced writeback error on close() (bsc#1200217).\n- cifs: sanitize multiple delimiters in prepath (bsc#1200217).\n- cifs: serialize all mount attempts (bsc#1200217).\n- cifs: set the CREATE_NOT_FILE when opening the directory in use_cached_dir() (bsc#1200217).\n- cifs: skip trailing separators of prefix paths (bsc#1200217).\n- cifs: smbd: fix typo in comment (bsc#1200217).\n- cifs: Split the smb3_add_credits tracepoint (bsc#1200217).\n- cifs: take cifs_tcp_ses_lock for status checks (bsc#1200217).\n- cifs: track individual channel status using chans_need_reconnect (bsc#1200217).\n- cifs: unlock chan_lock before calling cifs_put_tcp_session (bsc#1200217).\n- cifs: update internal module number (bsc#1193629).\n- cifs: update internal module number (bsc#1200217).\n- cifs: update tcpStatus during negotiate and sess setup (bsc#1200217).\n- cifs: use a different reconnect helper for non-cifsd threads (bsc#1200217).\n- cifs: use correct lock type in cifs_reconnect() (bsc#1200217).\n- cifs: Use kzalloc instead of kmalloc/memset (bsc#1200217).\n- cifs: use new enum for ses_status (bsc#1200217).\n- cifs: use the chans_need_reconnect bitmap for reconnect status (bsc#1200217).\n- cifs: verify that tcon is valid before dereference in cifs_kill_sb (bsc#1200217).\n- cifs: version operations for smb20 unneeded when legacy support disabled (bsc#1200217).\n- cifs: wait for tcon resource_id before getting fscache super (bsc#1200217).\n- cifs: we do not need a spinlock around the tree access during umount (bsc#1200217).\n- cifs: when extending a file with falloc we should make files not-sparse (bsc#1200217).\n- drivers: cpufreq: Add missing of_node_put() in qoriq-cpufreq.c (git-fixes).\n- drm/i915/reset: Fix error_state_read ptr + offset use (git-fixes).\n- drm/i915: Update TGL and RKL DMC firmware versions (bsc#1198924).\n- drm/msm: Fix double pm_runtime_disable() call (git-fixes).\n- drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf (git-fixes).\n- drm/sun4i: Fix crash during suspend after component bind failure (git-fixes).\n- exec: Force single empty string when argv is empty (bsc#1200571).\n- ext4: add check to prevent attempting to resize an fs with sparse_super2 (bsc#1197754).\n- ext4: fix bug_on ext4_mb_use_inode_pa (bsc#1200810).\n- ext4: fix bug_on in __es_tree_search (bsc#1200809).\n- ext4: fix race condition between ext4_write and ext4_convert_inline_data (bsc#1200807).\n- ext4: limit length to bitmap_maxbytes - blocksize in punch_hole (bsc#1200806).\n- ext4: make variable \u0027count\u0027 signed (bsc#1200820).\n- Fix a warning about a malformed kernel doc comment in cifs (bsc#1200217).\n- fuse: annotate lock in fuse_reverse_inval_entry() (bsc#1201143).\n- gpio: winbond: Fix error code in winbond_gpio_get() (git-fixes).\n- gtp: use icmp_ndo_send helper (git-fixes).\n- hwmon: (ibmaem) do not call platform_device_del() if platform_device_add() fails (git-fixes).\n- i2c: designware: Use standard optional ref clock implementation (git-fixes).\n- ibmvnic: Properly dispose of all skbs during a failover (bsc#1200925).\n- iio:accel:bma180: rearrange iio trigger get and register (git-fixes).\n- iio: accel: mma8452: ignore the return value of reset operation (git-fixes).\n- iio: adc: axp288: Override TS pin bias current for some models (git-fixes).\n- iio: adc: vf610: fix conversion mode sysfs node name (git-fixes).\n- iio:chemical:ccs811: rearrange iio trigger get and register (git-fixes).\n- iio: gyro: mpu3050: Fix the error handling in mpu3050_power_up() (git-fixes).\n- iio: trigger: sysfs: fix use-after-free on remove (git-fixes).\n- init: Initialize noop_backing_dev_info early (bsc#1200822).\n- inotify: show inotify mask flags in proc fdinfo (bsc#1200600).\n- iomap: iomap_write_failed fix (bsc#1200829).\n- ipvs: add sysctl_run_estimation to support disable estimation (bsc#1195504).\n- jfs: fix divide error in dbNextAG (bsc#1200828).\n- kABI fix of sysctl_run_estimation (git-fixes).\n- kabi: nvme workaround header include (bsc#1201193).\n- kabi/severities: ignore KABI for NVMe target (bsc#1192761)\n- linux/dim: Fix divide by 0 in RDMA DIM (git-fixes).\n- md: fix update super 1.0 on rdev size change (git-fixes).\n- move devm_allocate to end of structure for kABI (git-fixes).\n- mtd: rawnand: gpmi: Fix setting busy timeout setting (git-fixes).\n- net: ax25: Fix deadlock caused by skb_recv_datagram in ax25_recvmsg (git-fixes).\n- net: ethernet: stmmac: Disable hardware multicast filter (git-fixes).\n- net: ieee802154: ca8210: Stop leaking skb\u0027s (git-fixes).\n- net: lantiq: Add locking for TX DMA channel (git-fixes).\n- net: rose: fix UAF bugs caused by timer handler (git-fixes).\n- net: stmmac: reset Tx desc base address before restarting Tx (git-fixes).\n- net: usb: ax88179_178a: Fix packet receiving (git-fixes).\n- nfc: nfcmrvl: Fix irq_of_parse_and_map() return value (git-fixes).\n- nfc: nfcmrvl: Fix memory leak in nfcmrvl_play_deferred (git-fixes).\n- NFC: nxp-nci: Do not issue a zero length i2c_master_read() (git-fixes).\n- NFS: Do not report EINTR/ERESTARTSYS as mapping errors (git-fixes).\n- NFS: Do not report errors from nfs_pageio_complete() more than once (git-fixes).\n- NFS: Do not report flush errors in nfs_write_end() (git-fixes).\n- NFS: Further fixes to the writeback error handling (git-fixes).\n- NFS: Memory allocation failures are not server fatal errors (git-fixes).\n- NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout (git-fixes).\n- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).\n- nvdimm/region: Fix default alignment for small regions (git-fixes).\n- nvme: add CNTRLTYPE definitions for \u0027identify controller\u0027 (bsc#1192761).\n- nvme: Add connect option \u0027discovery\u0027 (bsc#1192761).\n- nvme: add new discovery log page entry definitions (bsc#1192761).\n- nvme: display correct subsystem NQN (bsc#1192761).\n- nvme: expose subsystem type in sysfs attribute \u0027subsystype\u0027 (bsc#1192761).\n- nvme: kabi fix nvme subsystype change (bsc#1192761)\n- nvmet: add nvmet_is_disc_subsys() helper (bsc#1192761).\n- nvmet: add nvmet_req_subsys() helper (bsc#1192761).\n- nvme-tcp: fix H2CData PDU send accounting (again) (git-fixes).\n- nvmet: do not check iosqes,iocqes for discovery controllers (bsc#1192761).\n- nvmet: fix freeing unallocated p2pmem (git-fixes).\n- nvmet: make discovery NQN configurable (bsc#1192761).\n- nvmet-rdma: Fix NULL deref when SEND is completed with error (git-fixes).\n- nvmet-rdma: Fix NULL deref when setting pi_enable and traddr INADDR_ANY (git-fixes).\n- nvmet: register discovery subsystem as \u0027current\u0027 (bsc#1192761).\n- nvmet: set \u0027CNTRLTYPE\u0027 in the identify controller data (bsc#1192761).\n- nvmet: switch check for subsystem type (bsc#1192761).\n- phy: aquantia: Fix AN when higher speeds than 1G are not advertised (git-fixes).\n- pNFS: Do not keep retrying if the server replied NFS4ERR_LAYOUTUNAVAILABLE (git-fixes).\n- powerpc/idle: Fix return value of __setup() handler (bsc#1065729).\n- powerpc/perf: Fix the threshold compare group constraint for power9 (bsc#1065729).\n- powerpc/rtas: Allow ibm,platform-dump RTAS call with null buffer address (bsc#1200343 ltc#198477).\n- random: Add and use pr_fmt() (bsc#1184924).\n- random: remove unnecessary unlikely() (bsc#1184924).\n- regmap-irq: Fix a bug in regmap_irq_enable() for type_in_mask chips (git-fixes).\n- Revert \u0027block: Fix a lockdep complaint triggered by request queue flushing\u0027 (git-fixes).\n- scsi: core: Show SCMD_LAST in text form (git-fixes).\n- scsi: ibmvfc: Allocate/free queue resource only during probe/remove (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: ibmvfc: Store vhost pointer during subcrq allocation (jsc#SLE-15442 bsc#1180814 ltc#187461 git-fixes).\n- scsi: lpfc: Add more logging of cmd and cqe information for aborted NVMe cmds (bsc#1201193).\n- scsi: lpfc: Address NULL pointer dereference after starget_to_rport() (bsc#1201193).\n- scsi: lpfc: Add support for ATTO Fibre Channel devices (bsc#1201193).\n- scsi: lpfc: Add support for VMID tagging of NVMe I/Os (bsc#1201193).\n- scsi: lpfc: Allow reduced polling rate for nvme_admin_async_event cmd completion (bsc#1201193).\n- scsi: lpfc: Commonize VMID code location (bsc#1201193).\n- scsi: lpfc: Correct BDE type for XMIT_SEQ64_WQE in lpfc_ct_reject_event() (bsc#1201193).\n- scsi: lpfc: Fix port stuck in bypassed state after LIP in PT2PT topology (bsc#1201193).\n- scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO is aborted (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following abort path refactoring (bsc#1201193).\n- scsi: lpfc: Resolve some cleanup issues following SLI path refactoring (bsc#1201193).\n- scsi: lpfc: Rework lpfc_vmid_get_appid() to be protocol independent (bsc#1201193).\n- scsi: lpfc: Update lpfc version to 14.2.0.4 (bsc#1201193).\n- scsi: nvme: Added a new sysfs attribute appid_store (bsc#1201193).\n- scsi: nvme-fc: Add new routine nvme_fc_io_getuuid() (bsc#1201193).\n- scsi: qla2xxx: Add a new v2 dport diagnostic feature (bsc#1201160).\n- scsi: qla2xxx: Add debug prints in the device remove path (bsc#1201160).\n- scsi: qla2xxx: edif: Add bsg interface to read doorbell events (bsc#1201160).\n- scsi: qla2xxx: edif: Add retry for ELS passthrough (bsc#1201160).\n- scsi: qla2xxx: edif: bsg refactor (bsc#1201160).\n- scsi: qla2xxx: edif: Fix I/O timeout due to over-subscription (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n discovery issue with secure target (bsc#1201160).\n- scsi: qla2xxx: edif: Fix n2n login retry for secure device (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no login after app start (bsc#1201160).\n- scsi: qla2xxx: edif: Fix no logout on delete for N2N (bsc#1201160).\n- scsi: qla2xxx: edif: Fix potential stuck session in sa update (bsc#1201160).\n- scsi: qla2xxx: edif: Fix session thrash (bsc#1201160).\n- scsi: qla2xxx: edif: Fix slow session teardown (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce disruption due to multiple app start (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce Initiator-Initiator thrashing (bsc#1201160).\n- scsi: qla2xxx: edif: Reduce N2N thrashing at app_start time (bsc#1201160).\n- scsi: qla2xxx: edif: Remove old doorbell interface (bsc#1201160).\n- scsi: qla2xxx: edif: Send LOGO for unexpected IKE message (bsc#1201160).\n- scsi: qla2xxx: edif: Synchronize NPIV deletion with authentication application (bsc#1201160).\n- scsi: qla2xxx: edif: Tear down session if keys have been removed (bsc#1201160).\n- scsi: qla2xxx: edif: Wait for app to ack on sess down (bsc#1201160).\n- scsi: qla2xxx: Fix crash due to stale SRB access around I/O timeouts (bsc#1201160).\n- scsi: qla2xxx: Fix erroneous mailbox timeout after PCI error injection (bsc#1201160).\n- scsi: qla2xxx: Fix excessive I/O error messages by default (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets during port perturbation tests (bsc#1201160).\n- scsi: qla2xxx: Fix losing FCP-2 targets on long port disable with I/Os (bsc#1201160).\n- scsi: qla2xxx: Fix losing target when it reappears during delete (bsc#1201160).\n- scsi: qla2xxx: Remove setting of \u0027req\u0027 and \u0027rsp\u0027 parameters (bsc#1201160).\n- scsi: qla2xxx: Remove unused \u0027ql_dm_tgt_ex_pct\u0027 parameter (bsc#1201160).\n- scsi: qla2xxx: Turn off multi-queue for 8G adapters (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.500-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.600-k (bsc#1201160).\n- scsi: qla2xxx: Update version to 10.02.07.700-k (bsc#1201160).\n- scsi: qla2xxx: Wind down adapter after PCIe error (bsc#1201160).\n- scsi: sd: sd_zbc: Do not pass GFP_NOIO to kvcalloc (git-fixes).\n- scsi: sd: sd_zbc: Fix handling of host-aware ZBC disks (git-fixes).\n- scsi: sd: sd_zbc: Fix ZBC disk initialization (git-fixes).\n- scsi: sd: Signal drive managed SMR disks (git-fixes).\n- scsi: sd_zbc: Do not limit max_zone_append sectors to (git-fixes).\n- scsi: sd_zbc: Ensure buffer size is aligned to SECTOR_SIZE (git-fixes).\n- scsi: sd_zbc: Improve zone revalidation (git-fixes).\n- scsi: sd_zbc: Remove unused inline functions (git-fixes).\n- scsi: sd_zbc: Support disks with more than 2**32 logical (git-fixes).\n- scsi: smartpqi: create module parameters for LUN reset (bsc#1179195 bsc#1200622).\n- smb3: add mount parm nosparse (bsc#1200217).\n- smb3: add trace point for lease not found issue (bsc#1200217).\n- smb3: add trace point for oplock not found (bsc#1200217).\n- smb3: check for null tcon (bsc#1200217).\n- smb3: cleanup and clarify status of tree connections (bsc#1200217).\n- smb3: do not set rc when used and unneeded in query_info_compound (bsc#1200217).\n- SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op (bsc#1200217).\n- smb3: fix incorrect session setup check for multiuser mounts (bsc#1200217).\n- smb3: fix ksmbd bigendian bug in oplock break, and move its struct to smbfs_common (bsc#1200217).\n- smb3: fix snapshot mount option (bsc#1200217).\n- smb3 improve error message when mount options conflict with posix (bsc#1200217).\n- smb3: move defines for ioctl protocol header and SMB2 sizes to smbfs_common (bsc#1200217).\n- smb3: move defines for query info and query fsinfo to smbfs_common (bsc#1200217).\n- smb3: move more common protocol header definitions to smbfs_common (bsc#1200217).\n- smb3: send NTLMSSP version information (bsc#1200217).\n- soc: bcm: brcmstb: pm: pm-arm: Fix refcount leak in brcmstb_pm_probe (git-fixes).\n- spi: Fix use-after-free with devm_spi_alloc_* (git-fixes).\n- SUNRPC: Fix the calculation of xdr-\u003eend in xdr_get_next_encode_buffer() (git-fixes).\n- sunvnet: use icmp_ndo_send helper (git-fixes).\n- tty: goldfish: Fix free_irq() on remove (git-fixes).\n- usb: chipidea: udc: check request status before setting device address (git-fixes).\n- usb: dwc2: Fix memory leak in dwc2_hcd_init (git-fixes).\n- usb: gadget: lpc32xx_udc: Fix refcount leak in lpc32xx_udc_probe (git-fixes).\n- usb: gadget: u_ether: fix regression in setting fixed MAC address (git-fixes).\n- usbnet: fix memory allocation in helpers (git-fixes).\n- USB: serial: io_ti: add Agilent E5805A support (git-fixes).\n- USB: serial: option: add Quectel EM05-G modem (git-fixes).\n- USB: serial: option: add Quectel RM500K module support (git-fixes).\n- USB: serial: option: add support for Cinterion MV31 with new baseline (git-fixes).\n- USB: serial: option: add Telit LE910Cx 0x1250 composition (git-fixes).\n- usb: xhci: Workaround for S3 issue on AMD SNPS 3.0 xHC (git-fixes).\n- veth: fix races around rq-\u003erx_notify_masked (git-fixes).\n- virtio-mmio: fix missing put_device() when vm_cmdline_parent registration failed (git-fixes).\n- virtio-net: fix race between ndo_open() and virtio_device_ready() (git-fixes).\n- virtio_net: fix xdp_rxq_info bug after suspend/resume (git-fixes).\n- virtio-pci: Remove wrong address verification in vp_del_vqs() (git-fixes).\n- vmxnet3: fix minimum vectors alloc issue (bsc#1199489).\n- writeback: Avoid skipping inode writeback (bsc#1200813).\n- writeback: Fix inode-\u003ei_io_list not be protected by inode-\u003ei_lock error (bsc#1200821).\n- xhci: Add reset resume quirk for AMD xhci controller (git-fixes).\n- x86/entry: Remove skip_r11rcx (bsc#1201644).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-Micro-5.2-2022-2549",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_2549-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:2549-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:2549-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1179195",
"url": "https://bugzilla.suse.com/1179195"
},
{
"category": "self",
"summary": "SUSE Bug 1180814",
"url": "https://bugzilla.suse.com/1180814"
},
{
"category": "self",
"summary": "SUSE Bug 1184924",
"url": "https://bugzilla.suse.com/1184924"
},
{
"category": "self",
"summary": "SUSE Bug 1185762",
"url": "https://bugzilla.suse.com/1185762"
},
{
"category": "self",
"summary": "SUSE Bug 1192761",
"url": "https://bugzilla.suse.com/1192761"
},
{
"category": "self",
"summary": "SUSE Bug 1193629",
"url": "https://bugzilla.suse.com/1193629"
},
{
"category": "self",
"summary": "SUSE Bug 1194013",
"url": "https://bugzilla.suse.com/1194013"
},
{
"category": "self",
"summary": "SUSE Bug 1195504",
"url": "https://bugzilla.suse.com/1195504"
},
{
"category": "self",
"summary": "SUSE Bug 1195775",
"url": "https://bugzilla.suse.com/1195775"
},
{
"category": "self",
"summary": "SUSE Bug 1196901",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "self",
"summary": "SUSE Bug 1197362",
"url": "https://bugzilla.suse.com/1197362"
},
{
"category": "self",
"summary": "SUSE Bug 1197754",
"url": "https://bugzilla.suse.com/1197754"
},
{
"category": "self",
"summary": "SUSE Bug 1198020",
"url": "https://bugzilla.suse.com/1198020"
},
{
"category": "self",
"summary": "SUSE Bug 1198924",
"url": "https://bugzilla.suse.com/1198924"
},
{
"category": "self",
"summary": "SUSE Bug 1199482",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "self",
"summary": "SUSE Bug 1199487",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "self",
"summary": "SUSE Bug 1199489",
"url": "https://bugzilla.suse.com/1199489"
},
{
"category": "self",
"summary": "SUSE Bug 1199657",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "self",
"summary": "SUSE Bug 1200217",
"url": "https://bugzilla.suse.com/1200217"
},
{
"category": "self",
"summary": "SUSE Bug 1200263",
"url": "https://bugzilla.suse.com/1200263"
},
{
"category": "self",
"summary": "SUSE Bug 1200343",
"url": "https://bugzilla.suse.com/1200343"
},
{
"category": "self",
"summary": "SUSE Bug 1200442",
"url": "https://bugzilla.suse.com/1200442"
},
{
"category": "self",
"summary": "SUSE Bug 1200571",
"url": "https://bugzilla.suse.com/1200571"
},
{
"category": "self",
"summary": "SUSE Bug 1200599",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "self",
"summary": "SUSE Bug 1200600",
"url": "https://bugzilla.suse.com/1200600"
},
{
"category": "self",
"summary": "SUSE Bug 1200604",
"url": "https://bugzilla.suse.com/1200604"
},
{
"category": "self",
"summary": "SUSE Bug 1200605",
"url": "https://bugzilla.suse.com/1200605"
},
{
"category": "self",
"summary": "SUSE Bug 1200608",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "self",
"summary": "SUSE Bug 1200619",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "self",
"summary": "SUSE Bug 1200622",
"url": "https://bugzilla.suse.com/1200622"
},
{
"category": "self",
"summary": "SUSE Bug 1200692",
"url": "https://bugzilla.suse.com/1200692"
},
{
"category": "self",
"summary": "SUSE Bug 1200806",
"url": "https://bugzilla.suse.com/1200806"
},
{
"category": "self",
"summary": "SUSE Bug 1200807",
"url": "https://bugzilla.suse.com/1200807"
},
{
"category": "self",
"summary": "SUSE Bug 1200809",
"url": "https://bugzilla.suse.com/1200809"
},
{
"category": "self",
"summary": "SUSE Bug 1200810",
"url": "https://bugzilla.suse.com/1200810"
},
{
"category": "self",
"summary": "SUSE Bug 1200813",
"url": "https://bugzilla.suse.com/1200813"
},
{
"category": "self",
"summary": "SUSE Bug 1200816",
"url": "https://bugzilla.suse.com/1200816"
},
{
"category": "self",
"summary": "SUSE Bug 1200820",
"url": "https://bugzilla.suse.com/1200820"
},
{
"category": "self",
"summary": "SUSE Bug 1200821",
"url": "https://bugzilla.suse.com/1200821"
},
{
"category": "self",
"summary": "SUSE Bug 1200822",
"url": "https://bugzilla.suse.com/1200822"
},
{
"category": "self",
"summary": "SUSE Bug 1200825",
"url": "https://bugzilla.suse.com/1200825"
},
{
"category": "self",
"summary": "SUSE Bug 1200828",
"url": "https://bugzilla.suse.com/1200828"
},
{
"category": "self",
"summary": "SUSE Bug 1200829",
"url": "https://bugzilla.suse.com/1200829"
},
{
"category": "self",
"summary": "SUSE Bug 1200925",
"url": "https://bugzilla.suse.com/1200925"
},
{
"category": "self",
"summary": "SUSE Bug 1201050",
"url": "https://bugzilla.suse.com/1201050"
},
{
"category": "self",
"summary": "SUSE Bug 1201080",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "self",
"summary": "SUSE Bug 1201143",
"url": "https://bugzilla.suse.com/1201143"
},
{
"category": "self",
"summary": "SUSE Bug 1201147",
"url": "https://bugzilla.suse.com/1201147"
},
{
"category": "self",
"summary": "SUSE Bug 1201149",
"url": "https://bugzilla.suse.com/1201149"
},
{
"category": "self",
"summary": "SUSE Bug 1201160",
"url": "https://bugzilla.suse.com/1201160"
},
{
"category": "self",
"summary": "SUSE Bug 1201171",
"url": "https://bugzilla.suse.com/1201171"
},
{
"category": "self",
"summary": "SUSE Bug 1201177",
"url": "https://bugzilla.suse.com/1201177"
},
{
"category": "self",
"summary": "SUSE Bug 1201193",
"url": "https://bugzilla.suse.com/1201193"
},
{
"category": "self",
"summary": "SUSE Bug 1201222",
"url": "https://bugzilla.suse.com/1201222"
},
{
"category": "self",
"summary": "SUSE Bug 1201644",
"url": "https://bugzilla.suse.com/1201644"
},
{
"category": "self",
"summary": "SUSE Bug 1201664",
"url": "https://bugzilla.suse.com/1201664"
},
{
"category": "self",
"summary": "SUSE Bug 1201672",
"url": "https://bugzilla.suse.com/1201672"
},
{
"category": "self",
"summary": "SUSE Bug 1201673",
"url": "https://bugzilla.suse.com/1201673"
},
{
"category": "self",
"summary": "SUSE Bug 1201676",
"url": "https://bugzilla.suse.com/1201676"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-26341 page",
"url": "https://www.suse.com/security/cve/CVE-2021-26341/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4157 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1012 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1679 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20132 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20141 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-20154 page",
"url": "https://www.suse.com/security/cve/CVE-2022-20154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29900 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29900/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29901 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-33981 page",
"url": "https://www.suse.com/security/cve/CVE-2022-33981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-34918 page",
"url": "https://www.suse.com/security/cve/CVE-2022-34918/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-07-26T11:59:18Z",
"generator": {
"date": "2022-07-26T11:59:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:2549-1",
"initial_release_date": "2022-07-26T11:59:18Z",
"revision_history": [
{
"date": "2022-07-26T11:59:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.87.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-150300.59.87.1.aarch64",
"product_id": "kernel-default-5.3.18-150300.59.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"product_id": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.87.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-150300.59.87.1.x86_64",
"product_id": "kernel-default-5.3.18-150300.59.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"product_id": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.2",
"product": {
"name": "openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.aarch64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.87.1.x86_64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.87.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64 as component of openSUSE Leap Micro 5.2",
"product_id": "openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-26341",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-26341"
}
],
"notes": [
{
"category": "general",
"text": "Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-26341",
"url": "https://www.suse.com/security/cve/CVE-2021-26341"
},
{
"category": "external",
"summary": "SUSE Bug 1191580 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1191580"
},
{
"category": "external",
"summary": "SUSE Bug 1196901 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "external",
"summary": "SUSE Bug 1201050 for CVE-2021-26341",
"url": "https://bugzilla.suse.com/1201050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:59:18Z",
"details": "moderate"
}
],
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-4157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4157"
}
],
"notes": [
{
"category": "general",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4157",
"url": "https://www.suse.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "SUSE Bug 1194013 for CVE-2021-4157",
"url": "https://bugzilla.suse.com/1194013"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:59:18Z",
"details": "moderate"
}
],
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2022-1012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1012"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1012",
"url": "https://www.suse.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "SUSE Bug 1199482 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199482"
},
{
"category": "external",
"summary": "SUSE Bug 1199694 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1199694"
},
{
"category": "external",
"summary": "SUSE Bug 1202335 for CVE-2022-1012",
"url": "https://bugzilla.suse.com/1202335"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:59:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-1679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1679"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1679",
"url": "https://www.suse.com/security/cve/CVE-2022-1679"
},
{
"category": "external",
"summary": "SUSE Bug 1199487 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1199487"
},
{
"category": "external",
"summary": "SUSE Bug 1201080 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201080"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212316 for CVE-2022-1679",
"url": "https://bugzilla.suse.com/1212316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:59:18Z",
"details": "important"
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-20132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20132"
}
],
"notes": [
{
"category": "general",
"text": "In lg_probe and related functions of hid-lg.c and other USB HID files, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure if a malicious USB HID device were plugged in, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-188677105References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20132",
"url": "https://www.suse.com/security/cve/CVE-2022-20132"
},
{
"category": "external",
"summary": "SUSE Bug 1200619 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1200619"
},
{
"category": "external",
"summary": "SUSE Bug 1212287 for CVE-2022-20132",
"url": "https://bugzilla.suse.com/1212287"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:59:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20141"
}
],
"notes": [
{
"category": "general",
"text": "In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20141",
"url": "https://www.suse.com/security/cve/CVE-2022-20141"
},
{
"category": "external",
"summary": "SUSE Bug 1200604 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1200604"
},
{
"category": "external",
"summary": "SUSE Bug 1200605 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1200605"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-20141",
"url": "https://bugzilla.suse.com/1203034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:59:18Z",
"details": "important"
}
],
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-20154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-20154"
}
],
"notes": [
{
"category": "general",
"text": "In lock_sock_nested of sock.c, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-174846563References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-20154",
"url": "https://www.suse.com/security/cve/CVE-2022-20154"
},
{
"category": "external",
"summary": "SUSE Bug 1200599 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200599"
},
{
"category": "external",
"summary": "SUSE Bug 1200608 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1200608"
},
{
"category": "external",
"summary": "SUSE Bug 1224298 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224298"
},
{
"category": "external",
"summary": "SUSE Bug 1224878 for CVE-2022-20154",
"url": "https://bugzilla.suse.com/1224878"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:59:18Z",
"details": "important"
}
],
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-29900",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29900"
}
],
"notes": [
{
"category": "general",
"text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29900",
"url": "https://www.suse.com/security/cve/CVE-2022-29900"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29900",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:59:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29901"
}
],
"notes": [
{
"category": "general",
"text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29901",
"url": "https://www.suse.com/security/cve/CVE-2022-29901"
},
{
"category": "external",
"summary": "SUSE Bug 1199657 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1199657"
},
{
"category": "external",
"summary": "SUSE Bug 1201469 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1201469"
},
{
"category": "external",
"summary": "SUSE Bug 1207894 for CVE-2022-29901",
"url": "https://bugzilla.suse.com/1207894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:59:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-33981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-33981"
}
],
"notes": [
{
"category": "general",
"text": "drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-33981",
"url": "https://www.suse.com/security/cve/CVE-2022-33981"
},
{
"category": "external",
"summary": "SUSE Bug 1200692 for CVE-2022-33981",
"url": "https://bugzilla.suse.com/1200692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:59:18Z",
"details": "moderate"
}
],
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-34918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-34918"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-34918",
"url": "https://www.suse.com/security/cve/CVE-2022-34918"
},
{
"category": "external",
"summary": "SUSE Bug 1201171 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201171"
},
{
"category": "external",
"summary": "SUSE Bug 1201177 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201177"
},
{
"category": "external",
"summary": "SUSE Bug 1201222 for CVE-2022-34918",
"url": "https://bugzilla.suse.com/1201222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-5.3.18-150300.59.87.1.x86_64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.aarch64",
"openSUSE Leap Micro 5.2:kernel-default-base-5.3.18-150300.59.87.1.150300.18.50.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-07-26T11:59:18Z",
"details": "important"
}
],
"title": "CVE-2022-34918"
}
]
}
WID-SEC-W-2022-0501
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- NetApp Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0501 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0501.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0501 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0501"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6858043 vom 2023-02-22",
"url": "https://www.ibm.com/support/pages/node/6858043"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6855297 vom 2023-01-13",
"url": "https://www.ibm.com/support/pages/node/6855297"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6851373 vom 2022-12-23",
"url": "https://www.ibm.com/support/pages/node/6851373"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6848583 vom 2022-12-22",
"url": "https://www.ibm.com/support/pages/node/6848583"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6847643 vom 2022-12-20",
"url": "https://www.ibm.com/support/pages/node/6847643"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6840319 vom 2022-11-19",
"url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-kernel-cve-2022-1012-affects-power-hmc/"
},
{
"category": "external",
"summary": "Red Hat Bugzilla - Bug 2064604 vom 2022-06-28",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "Red Hat Security Advisory CVE-2022-1012 vom 2022-06-28",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5214 vom 2022-06-28",
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5267 vom 2022-06-28",
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5249 vom 2022-07-01",
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2422-1 vom 2022-07-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2424-1 vom 2022-07-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5633 vom 2022-07-20",
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5626 vom 2022-07-20",
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5636 vom 2022-07-20",
"url": "https://access.redhat.com/errata/RHSA-2022:5636"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-030 vom 2022-07-21",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-030.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-028 vom 2022-07-21",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-028.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2022-016 vom 2022-07-21",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-016.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2022-015 vom 2022-07-21",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-015.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2549-1 vom 2022-07-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5834 vom 2022-08-02",
"url": "https://access.redhat.com/errata/RHSA-2022:5834"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5819 vom 2022-08-03",
"url": "https://access.redhat.com/errata/RHSA-2022:5819"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-5819 vom 2022-08-10",
"url": "http://linux.oracle.com/errata/ELSA-2022-5819.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5599-1 vom 2022-09-06",
"url": "https://ubuntu.com/security/notices/USN-5599-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5602-1 vom 2022-09-08",
"url": "https://ubuntu.com/security/notices/USN-5602-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:6551 vom 2022-09-19",
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2022-266 vom 2022-09-21",
"url": "https://www.dell.com/support/kbdoc/000203560/dsa-2022-266-dell-networker-vproxy-security-update-for-multiple-third-party-vulnerabilities"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5630-1 vom 2022-09-22",
"url": "https://ubuntu.com/security/notices/USN-5630-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5654-1 vom 2022-10-04",
"url": "https://ubuntu.com/security/notices/USN-5654-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5660-1 vom 2022-10-06",
"url": "https://ubuntu.com/security/notices/USN-5660-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5669-1 vom 2022-10-11",
"url": "https://ubuntu.com/security/notices/USN-5669-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5669-2 vom 2022-10-11",
"url": "https://ubuntu.com/security/notices/USN-5669-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5679-1 vom 2022-10-13",
"url": "https://ubuntu.com/security/notices/USN-5679-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5678-1 vom 2022-10-13",
"url": "https://ubuntu.com/security/notices/USN-5678-1"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20221020-0006 vom 2022-10-20",
"url": "https://security.netapp.com/advisory/ntap-20221020-0006/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5695-1 vom 2022-10-21",
"url": "https://ubuntu.com/security/notices/USN-5695-1"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2023-02-21T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:29:33.537+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-0501",
"initial_release_date": "2022-06-28T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-06-28T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-06-30T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-07-18T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-07-19T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-07-20T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-07-26T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-08-02T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-08-03T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-08-09T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-09-05T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-09-08T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-09-19T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-09-20T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2022-09-22T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-04T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-05T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-10T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-13T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-20T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2022-10-23T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-11-20T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2022-12-20T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2022-12-21T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2022-12-22T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von IBM und IBM-APAR aufgenommen"
},
{
"date": "2023-01-12T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-02-21T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "26"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T024663",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM DataPower Gateway 10.5.0",
"product": {
"name": "IBM DataPower Gateway 10.5.0",
"product_id": "T025693",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:datapower_gateway:10.5.0"
}
}
},
{
"category": "product_name",
"name": "IBM FlashSystem",
"product": {
"name": "IBM FlashSystem",
"product_id": "T025159",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:flashsystem:-"
}
}
},
{
"category": "product_name",
"name": "IBM MQ Appliance",
"product": {
"name": "IBM MQ Appliance",
"product_id": "T025711",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:appliance"
}
}
},
{
"category": "product_name",
"name": "IBM Power Hardware Management Console",
"product": {
"name": "IBM Power Hardware Management Console",
"product_id": "5114",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:hardware_management_console:-"
}
}
},
{
"category": "product_name",
"name": "IBM SAN Volume Controller",
"product": {
"name": "IBM SAN Volume Controller",
"product_id": "T002782",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:san_volume_controller:-"
}
}
},
{
"category": "product_name",
"name": "IBM Security Verify Access \u003c 10.0.5-ISS-ISVA-FP000",
"product": {
"name": "IBM Security Verify Access \u003c 10.0.5-ISS-ISVA-FP000",
"product_id": "T025829",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_verify_access:10.0.5-iss-isva-fp000"
}
}
},
{
"category": "product_name",
"name": "IBM Spectrum Protect 10.1",
"product": {
"name": "IBM Spectrum Protect 10.1",
"product_id": "T023657",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:10.1"
}
}
},
{
"category": "product_name",
"name": "IBM Storwize",
"product": {
"name": "IBM Storwize",
"product_id": "T021621",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:storwize:-"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp AFF Baseboard Management Controller",
"product": {
"name": "NetApp AFF Baseboard Management Controller",
"product_id": "T025086",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:aff:::baseboard_management_controller"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T006656",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux 9",
"product": {
"name": "Red Hat Enterprise Linux 9",
"product_id": "T023632",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1012",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Linux Kernel. Der Fehler besteht auf einem Speicherleck in dem Algorithmus zur Erzeugung eines TCP-Quellportes in der Funktion \"net/ipv4/tcp.c\". Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren oder Informationen offenzulegen."
}
],
"product_status": {
"known_affected": [
"T025086",
"T002782",
"T006656",
"67646",
"5114",
"T004914",
"T025829",
"T021621",
"T002207",
"T023632",
"T025711",
"T000126",
"T023657",
"T024663",
"398363",
"T025159",
"T025693"
]
},
"release_date": "2022-06-28T22:00:00.000+00:00",
"title": "CVE-2022-1012"
}
]
}
WID-SEC-W-2023-1432
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die SIMATIC S7 ist eine Serie von SPS (Speicherprogrammierbare Steuerungen) f\u00fcr Automatisierungsanwendungen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, physischer oder lokaler Angreifer kann mehrere Schwachstellen in Siemens SIMATIC S7 ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1432 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1432.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1432 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1432"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6187-1 vom 2023-06-22",
"url": "https://ubuntu.com/security/notices/USN-6187-1"
},
{
"category": "external",
"summary": "Siemens Security Advisory vom 2023-06-12",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831302.html"
},
{
"category": "external",
"summary": "Siemens Security Advisory vom 2023-06-12",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html"
}
],
"source_lang": "en-US",
"title": "Siemens SIMATIC S7: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-06-22T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:52:18.956+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1432",
"initial_release_date": "2023-06-12T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-06-12T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-06-22T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Siemens SIMATIC S7 1500 TM MFP",
"product": {
"name": "Siemens SIMATIC S7 1500 TM MFP",
"product_id": "T028071",
"product_identification_helper": {
"cpe": "cpe:/h:siemens:simatic_s7:1500_tm_mfp"
}
}
}
],
"category": "vendor",
"name": "Siemens"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26607",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-26607"
},
{
"cve": "CVE-2023-23559",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-23455",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-23454",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-1095",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1077",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-1077"
},
{
"cve": "CVE-2023-1073",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-1073"
},
{
"cve": "CVE-2023-0590",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0394",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0394"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0179",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0179"
},
{
"cve": "CVE-2022-47946",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47946"
},
{
"cve": "CVE-2022-47929",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-47520",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47520"
},
{
"cve": "CVE-2022-47518",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47518"
},
{
"cve": "CVE-2022-4662",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-4378",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43750",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-42896",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-42895",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42722",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-42721",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42720",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42719",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42703",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42432",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42432"
},
{
"cve": "CVE-2022-42329",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42328",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-41850",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41849",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41849"
},
{
"cve": "CVE-2022-41674",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-4139",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4129",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-41222",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-41218",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4095",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-40768",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-40307",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-39190",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-39190"
},
{
"cve": "CVE-2022-39188",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-36946",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-36879",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-3649",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-3646",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3635",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3633",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3633"
},
{
"cve": "CVE-2022-3629",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-36280",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-3628",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3625",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3621",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-36123",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36123"
},
{
"cve": "CVE-2022-3606",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3606"
},
{
"cve": "CVE-2022-3594",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3586",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3565",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3545",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3534",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3534"
},
{
"cve": "CVE-2022-3524",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3521",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-34918",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-34918"
},
{
"cve": "CVE-2022-3435",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3435"
},
{
"cve": "CVE-2022-3303",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-32296",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-32250",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-32250"
},
{
"cve": "CVE-2022-3169",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3115",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3115"
},
{
"cve": "CVE-2022-3104",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3104"
},
{
"cve": "CVE-2022-3028",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-30065",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-30065"
},
{
"cve": "CVE-2022-2978",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2978"
},
{
"cve": "CVE-2022-2959",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2959"
},
{
"cve": "CVE-2022-2905",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2905"
},
{
"cve": "CVE-2022-28391",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-28391"
},
{
"cve": "CVE-2022-2663",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-26373",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2602",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-2588",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2586",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-2585",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2585"
},
{
"cve": "CVE-2022-2503",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-2327",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2327"
},
{
"cve": "CVE-2022-23219",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-23219"
},
{
"cve": "CVE-2022-23218",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-23218"
},
{
"cve": "CVE-2022-2274",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2274"
},
{
"cve": "CVE-2022-2153",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-21505",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21505"
},
{
"cve": "CVE-2022-21233",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21233"
},
{
"cve": "CVE-2022-21166",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21125",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21123",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-2097",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-2078",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2078"
},
{
"cve": "CVE-2022-2068",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-20572",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20572"
},
{
"cve": "CVE-2022-20566",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20566"
},
{
"cve": "CVE-2022-20422",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20422"
},
{
"cve": "CVE-2022-20421",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20421"
},
{
"cve": "CVE-2022-1882",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1882"
},
{
"cve": "CVE-2022-1852",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1852"
},
{
"cve": "CVE-2022-1679",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1473",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1473"
},
{
"cve": "CVE-2022-1462",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1434",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1434"
},
{
"cve": "CVE-2022-1343",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1343"
},
{
"cve": "CVE-2022-1292",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1184",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1012",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-0171",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-0171"
},
{
"cve": "CVE-2021-42386",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42386"
},
{
"cve": "CVE-2021-42385",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42384",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42383",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42382",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42381",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42380",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42379",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42378",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42377",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42376",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42375",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42374",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42373",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-4037",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2021-3999",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3999"
},
{
"cve": "CVE-2021-3998",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3998"
},
{
"cve": "CVE-2021-38604",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-38604"
},
{
"cve": "CVE-2021-3759",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-35942",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-35942"
},
{
"cve": "CVE-2021-33655",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-33574",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-33574"
},
{
"cve": "CVE-2021-3326",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3326"
},
{
"cve": "CVE-2021-28831",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-28831"
},
{
"cve": "CVE-2021-27645",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-27645"
},
{
"cve": "CVE-2021-20269",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-20269"
},
{
"cve": "CVE-2020-29562",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-29562"
},
{
"cve": "CVE-2020-27618",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-27618"
},
{
"cve": "CVE-2020-1752",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-1752"
},
{
"cve": "CVE-2020-10029",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-10029"
},
{
"cve": "CVE-2019-25013",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2019-25013"
},
{
"cve": "CVE-2018-13405",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2018-13405"
},
{
"cve": "CVE-2016-10228",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2016-10228"
}
]
}
wid-sec-w-2023-1432
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die SIMATIC S7 ist eine Serie von SPS (Speicherprogrammierbare Steuerungen) f\u00fcr Automatisierungsanwendungen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter, physischer oder lokaler Angreifer kann mehrere Schwachstellen in Siemens SIMATIC S7 ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1432 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1432.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1432 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1432"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6187-1 vom 2023-06-22",
"url": "https://ubuntu.com/security/notices/USN-6187-1"
},
{
"category": "external",
"summary": "Siemens Security Advisory vom 2023-06-12",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-831302.html"
},
{
"category": "external",
"summary": "Siemens Security Advisory vom 2023-06-12",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html"
}
],
"source_lang": "en-US",
"title": "Siemens SIMATIC S7: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-06-22T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:52:18.956+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1432",
"initial_release_date": "2023-06-12T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-06-12T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-06-22T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Siemens SIMATIC S7 1500 TM MFP",
"product": {
"name": "Siemens SIMATIC S7 1500 TM MFP",
"product_id": "T028071",
"product_identification_helper": {
"cpe": "cpe:/h:siemens:simatic_s7:1500_tm_mfp"
}
}
}
],
"category": "vendor",
"name": "Siemens"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26607",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-26607"
},
{
"cve": "CVE-2023-23559",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-23455",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-23454",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-1095",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1077",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-1077"
},
{
"cve": "CVE-2023-1073",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-1073"
},
{
"cve": "CVE-2023-0590",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0394",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0394"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0179",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2023-0179"
},
{
"cve": "CVE-2022-47946",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47946"
},
{
"cve": "CVE-2022-47929",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-47520",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47520"
},
{
"cve": "CVE-2022-47518",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-47518"
},
{
"cve": "CVE-2022-4662",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-4378",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43750",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-42896",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-42895",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42722",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-42721",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42720",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42719",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42703",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42432",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42432"
},
{
"cve": "CVE-2022-42329",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42328",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-41850",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41849",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41849"
},
{
"cve": "CVE-2022-41674",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-4139",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4129",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-41222",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-41218",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4095",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-40768",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-40307",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-39190",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-39190"
},
{
"cve": "CVE-2022-39188",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-36946",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-36879",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-3649",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-3646",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3635",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3633",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3633"
},
{
"cve": "CVE-2022-3629",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-36280",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-3628",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3625",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3621",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-36123",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-36123"
},
{
"cve": "CVE-2022-3606",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3606"
},
{
"cve": "CVE-2022-3594",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3586",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3565",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3545",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3534",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3534"
},
{
"cve": "CVE-2022-3524",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3521",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-34918",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-34918"
},
{
"cve": "CVE-2022-3435",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3435"
},
{
"cve": "CVE-2022-3303",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-32296",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-32250",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-32250"
},
{
"cve": "CVE-2022-3169",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3115",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3115"
},
{
"cve": "CVE-2022-3104",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3104"
},
{
"cve": "CVE-2022-3028",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-30065",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-30065"
},
{
"cve": "CVE-2022-2978",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2978"
},
{
"cve": "CVE-2022-2959",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2959"
},
{
"cve": "CVE-2022-2905",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2905"
},
{
"cve": "CVE-2022-28391",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-28391"
},
{
"cve": "CVE-2022-2663",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-26373",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2602",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-2588",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2586",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-2585",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2585"
},
{
"cve": "CVE-2022-2503",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-2327",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2327"
},
{
"cve": "CVE-2022-23219",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-23219"
},
{
"cve": "CVE-2022-23218",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-23218"
},
{
"cve": "CVE-2022-2274",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2274"
},
{
"cve": "CVE-2022-2153",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-21505",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21505"
},
{
"cve": "CVE-2022-21233",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21233"
},
{
"cve": "CVE-2022-21166",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21125",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21123",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-2097",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-2078",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2078"
},
{
"cve": "CVE-2022-2068",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-20572",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20572"
},
{
"cve": "CVE-2022-20566",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20566"
},
{
"cve": "CVE-2022-20422",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20422"
},
{
"cve": "CVE-2022-20421",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-20421"
},
{
"cve": "CVE-2022-1882",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1882"
},
{
"cve": "CVE-2022-1852",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1852"
},
{
"cve": "CVE-2022-1679",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1473",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1473"
},
{
"cve": "CVE-2022-1462",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1434",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1434"
},
{
"cve": "CVE-2022-1343",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1343"
},
{
"cve": "CVE-2022-1292",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1184",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1012",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-0171",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2022-0171"
},
{
"cve": "CVE-2021-42386",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42386"
},
{
"cve": "CVE-2021-42385",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42385"
},
{
"cve": "CVE-2021-42384",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42384"
},
{
"cve": "CVE-2021-42383",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42383"
},
{
"cve": "CVE-2021-42382",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42382"
},
{
"cve": "CVE-2021-42381",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42381"
},
{
"cve": "CVE-2021-42380",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42380"
},
{
"cve": "CVE-2021-42379",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42379"
},
{
"cve": "CVE-2021-42378",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42378"
},
{
"cve": "CVE-2021-42377",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42377"
},
{
"cve": "CVE-2021-42376",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42376"
},
{
"cve": "CVE-2021-42375",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42375"
},
{
"cve": "CVE-2021-42374",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42374"
},
{
"cve": "CVE-2021-42373",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-42373"
},
{
"cve": "CVE-2021-4037",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2021-3999",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3999"
},
{
"cve": "CVE-2021-3998",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3998"
},
{
"cve": "CVE-2021-38604",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-38604"
},
{
"cve": "CVE-2021-3759",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-35942",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-35942"
},
{
"cve": "CVE-2021-33655",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-33574",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-33574"
},
{
"cve": "CVE-2021-3326",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-3326"
},
{
"cve": "CVE-2021-28831",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-28831"
},
{
"cve": "CVE-2021-27645",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-27645"
},
{
"cve": "CVE-2021-20269",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2021-20269"
},
{
"cve": "CVE-2020-29562",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-29562"
},
{
"cve": "CVE-2020-27618",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-27618"
},
{
"cve": "CVE-2020-1752",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-1752"
},
{
"cve": "CVE-2020-10029",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2020-10029"
},
{
"cve": "CVE-2019-25013",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2019-25013"
},
{
"cve": "CVE-2018-13405",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2018-13405"
},
{
"cve": "CVE-2016-10228",
"notes": [
{
"category": "description",
"text": "In Siemens SIMATIC S7 existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem aufgrund von unzul\u00e4ssigen Einschr\u00e4nkungen, Puffer\u00fcberl\u00e4ufen, fehlenden Freigaben und use-after-free-Problemen. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien zu erweitern und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Privilegien."
}
],
"product_status": {
"known_affected": [
"T000126",
"T028071"
]
},
"release_date": "2023-06-12T22:00:00.000+00:00",
"title": "CVE-2016-10228"
}
]
}
wid-sec-w-2022-0501
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- NetApp Appliance",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0501 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0501.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0501 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0501"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6858043 vom 2023-02-22",
"url": "https://www.ibm.com/support/pages/node/6858043"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6855297 vom 2023-01-13",
"url": "https://www.ibm.com/support/pages/node/6855297"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6851373 vom 2022-12-23",
"url": "https://www.ibm.com/support/pages/node/6851373"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6848583 vom 2022-12-22",
"url": "https://www.ibm.com/support/pages/node/6848583"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6847643 vom 2022-12-20",
"url": "https://www.ibm.com/support/pages/node/6847643"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6840319 vom 2022-11-19",
"url": "https://www.ibm.com/blogs/psirt/security-bulletin-vulnerability-in-kernel-cve-2022-1012-affects-power-hmc/"
},
{
"category": "external",
"summary": "Red Hat Bugzilla - Bug 2064604 vom 2022-06-28",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"category": "external",
"summary": "Red Hat Security Advisory CVE-2022-1012 vom 2022-06-28",
"url": "https://access.redhat.com/security/cve/CVE-2022-1012"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5214 vom 2022-06-28",
"url": "https://access.redhat.com/errata/RHSA-2022:5214"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5267 vom 2022-06-28",
"url": "https://access.redhat.com/errata/RHSA-2022:5267"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5249 vom 2022-07-01",
"url": "https://access.redhat.com/errata/RHSA-2022:5249"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2422-1 vom 2022-07-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2424-1 vom 2022-07-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5633 vom 2022-07-20",
"url": "https://access.redhat.com/errata/RHSA-2022:5633"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5626 vom 2022-07-20",
"url": "https://access.redhat.com/errata/RHSA-2022:5626"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5636 vom 2022-07-20",
"url": "https://access.redhat.com/errata/RHSA-2022:5636"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-030 vom 2022-07-21",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-030.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-028 vom 2022-07-21",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-028.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2022-016 vom 2022-07-21",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-016.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2022-015 vom 2022-07-21",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-015.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2549-1 vom 2022-07-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5834 vom 2022-08-02",
"url": "https://access.redhat.com/errata/RHSA-2022:5834"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5819 vom 2022-08-03",
"url": "https://access.redhat.com/errata/RHSA-2022:5819"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-5819 vom 2022-08-10",
"url": "http://linux.oracle.com/errata/ELSA-2022-5819.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5599-1 vom 2022-09-06",
"url": "https://ubuntu.com/security/notices/USN-5599-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5602-1 vom 2022-09-08",
"url": "https://ubuntu.com/security/notices/USN-5602-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:6551 vom 2022-09-19",
"url": "https://access.redhat.com/errata/RHSA-2022:6551"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2022-266 vom 2022-09-21",
"url": "https://www.dell.com/support/kbdoc/000203560/dsa-2022-266-dell-networker-vproxy-security-update-for-multiple-third-party-vulnerabilities"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5630-1 vom 2022-09-22",
"url": "https://ubuntu.com/security/notices/USN-5630-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5654-1 vom 2022-10-04",
"url": "https://ubuntu.com/security/notices/USN-5654-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5660-1 vom 2022-10-06",
"url": "https://ubuntu.com/security/notices/USN-5660-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5669-1 vom 2022-10-11",
"url": "https://ubuntu.com/security/notices/USN-5669-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5669-2 vom 2022-10-11",
"url": "https://ubuntu.com/security/notices/USN-5669-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5679-1 vom 2022-10-13",
"url": "https://ubuntu.com/security/notices/USN-5679-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5678-1 vom 2022-10-13",
"url": "https://ubuntu.com/security/notices/USN-5678-1"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20221020-0006 vom 2022-10-20",
"url": "https://security.netapp.com/advisory/ntap-20221020-0006/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5695-1 vom 2022-10-21",
"url": "https://ubuntu.com/security/notices/USN-5695-1"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2023-02-21T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:29:33.537+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-0501",
"initial_release_date": "2022-06-28T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-06-28T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-06-30T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-07-18T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-07-19T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-07-20T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-07-26T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-08-02T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-08-03T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-08-09T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-09-05T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-09-08T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-09-19T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-09-20T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2022-09-22T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-04T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-05T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-10T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-13T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-20T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2022-10-23T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-11-20T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2022-12-20T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2022-12-21T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2022-12-22T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von IBM und IBM-APAR aufgenommen"
},
{
"date": "2023-01-12T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-02-21T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "26"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T024663",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM DataPower Gateway 10.5.0",
"product": {
"name": "IBM DataPower Gateway 10.5.0",
"product_id": "T025693",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:datapower_gateway:10.5.0"
}
}
},
{
"category": "product_name",
"name": "IBM FlashSystem",
"product": {
"name": "IBM FlashSystem",
"product_id": "T025159",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:flashsystem:-"
}
}
},
{
"category": "product_name",
"name": "IBM MQ Appliance",
"product": {
"name": "IBM MQ Appliance",
"product_id": "T025711",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:appliance"
}
}
},
{
"category": "product_name",
"name": "IBM Power Hardware Management Console",
"product": {
"name": "IBM Power Hardware Management Console",
"product_id": "5114",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:hardware_management_console:-"
}
}
},
{
"category": "product_name",
"name": "IBM SAN Volume Controller",
"product": {
"name": "IBM SAN Volume Controller",
"product_id": "T002782",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:san_volume_controller:-"
}
}
},
{
"category": "product_name",
"name": "IBM Security Verify Access \u003c 10.0.5-ISS-ISVA-FP000",
"product": {
"name": "IBM Security Verify Access \u003c 10.0.5-ISS-ISVA-FP000",
"product_id": "T025829",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_verify_access:10.0.5-iss-isva-fp000"
}
}
},
{
"category": "product_name",
"name": "IBM Spectrum Protect 10.1",
"product": {
"name": "IBM Spectrum Protect 10.1",
"product_id": "T023657",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect:10.1"
}
}
},
{
"category": "product_name",
"name": "IBM Storwize",
"product": {
"name": "IBM Storwize",
"product_id": "T021621",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:storwize:-"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp AFF Baseboard Management Controller",
"product": {
"name": "NetApp AFF Baseboard Management Controller",
"product_id": "T025086",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:aff:::baseboard_management_controller"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T006656",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux 9",
"product": {
"name": "Red Hat Enterprise Linux 9",
"product_id": "T023632",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1012",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Linux Kernel. Der Fehler besteht auf einem Speicherleck in dem Algorithmus zur Erzeugung eines TCP-Quellportes in der Funktion \"net/ipv4/tcp.c\". Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren oder Informationen offenzulegen."
}
],
"product_status": {
"known_affected": [
"T025086",
"T002782",
"T006656",
"67646",
"5114",
"T004914",
"T025829",
"T021621",
"T002207",
"T023632",
"T025711",
"T000126",
"T023657",
"T024663",
"398363",
"T025159",
"T025693"
]
},
"release_date": "2022-06-28T22:00:00.000+00:00",
"title": "CVE-2022-1012"
}
]
}
msrc_cve-2022-1012
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1012 A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-1012.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"tracking": {
"current_release_date": "2022-08-12T00:00:00.000Z",
"generator": {
"date": "2025-10-19T23:51:07.177Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2022-1012",
"initial_release_date": "2022-08-02T00:00:00.000Z",
"revision_history": [
{
"date": "2022-08-12T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 kernel 5.10.134.1-2",
"product": {
"name": "\u003ccm1 kernel 5.10.134.1-2",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cm1 kernel 5.10.134.1-2",
"product": {
"name": "cm1 kernel 5.10.134.1-2",
"product_id": "18638"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 kernel 5.15.67.1-4",
"product": {
"name": "\u003ccbl2 kernel 5.15.67.1-4",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 kernel 5.15.67.1-4",
"product": {
"name": "cbl2 kernel 5.15.67.1-4",
"product_id": "18617"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 kernel 5.10.134.1-2 as a component of CBL Mariner 1.0",
"product_id": "16820-1"
},
"product_reference": "1",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 kernel 5.10.134.1-2 as a component of CBL Mariner 1.0",
"product_id": "18638-16820"
},
"product_reference": "18638",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 kernel 5.15.67.1-4 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kernel 5.15.67.1-4 as a component of CBL Mariner 2.0",
"product_id": "18617-17086"
},
"product_reference": "18617",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"18638-16820",
"18617-17086"
],
"known_affected": [
"16820-1",
"17086-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-1012 A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2022-1012.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2022-08-12T00:00:00.000Z",
"details": "5.10.134.1-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2022-08-12T00:00:00.000Z",
"details": "5.15.67.1-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.2,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"16820-1",
"17086-2"
]
}
],
"title": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem."
}
]
}
gsd-2022-1012
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2022-1012",
"description": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"id": "GSD-2022-1012",
"references": [
"https://www.debian.org/security/2022/dsa-5161",
"https://advisories.mageia.org/CVE-2022-1012.html",
"https://www.suse.com/security/cve/CVE-2022-1012.html",
"https://www.debian.org/security/2022/dsa-5173",
"https://access.redhat.com/errata/RHSA-2022:5214",
"https://access.redhat.com/errata/RHSA-2022:5220",
"https://access.redhat.com/errata/RHSA-2022:5224",
"https://access.redhat.com/errata/RHSA-2022:5249",
"https://access.redhat.com/errata/RHSA-2022:5267",
"https://alas.aws.amazon.com/cve/html/CVE-2022-1012.html",
"https://access.redhat.com/errata/RHSA-2022:5626",
"https://access.redhat.com/errata/RHSA-2022:5633",
"https://access.redhat.com/errata/RHSA-2022:5636",
"https://access.redhat.com/errata/RHSA-2022:5819",
"https://access.redhat.com/errata/RHSA-2022:5834",
"https://access.redhat.com/errata/RHSA-2022:6551",
"https://ubuntu.com/security/CVE-2022-1012"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-1012"
],
"details": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"id": "GSD-2022-1012",
"modified": "2023-12-13T01:19:28.506105Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2022-1012",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Kernel",
"version": {
"version_data": [
{
"version_value": "Linux kernel version prior to 5.18-rc6"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-401"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://lore.kernel.org/lkml/20220427065233.2075-1-w@1wt.eu/T/",
"refsource": "MISC",
"url": "https://lore.kernel.org/lkml/20220427065233.2075-1-w@1wt.eu/T/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"name": "https://security.netapp.com/advisory/ntap-20221020-0006/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20221020-0006/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.18",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:5.18:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2022-1012"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"name": "https://lore.kernel.org/lkml/20220427065233.2075-1-w@1wt.eu/T/",
"refsource": "MISC",
"tags": [
"Mailing List",
"Patch",
"Vendor Advisory"
],
"url": "https://lore.kernel.org/lkml/20220427065233.2075-1-w@1wt.eu/T/"
},
{
"name": "https://security.netapp.com/advisory/ntap-20221020-0006/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20221020-0006/"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
},
"lastModifiedDate": "2022-10-28T20:06Z",
"publishedDate": "2022-08-05T16:15Z"
}
}
}
ssa-794697
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.0.\n\nSiemens has released a new version for SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem and recommends to update to the latest version.\n\nThis advisory lists vulnerabilities for firmware version V1.0 only; for V1.1 refer to Siemens Security Advisory SSA-265688 (\nhttps://cert-portal.siemens.com/productcert/html/ssa-265688.html).",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html"
},
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-794697.json"
},
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-794697.pdf"
},
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-794697.txt"
}
],
"title": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1",
"tracking": {
"current_release_date": "2024-04-09T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-794697",
"initial_release_date": "2023-06-13T00:00:00Z",
"revision_history": [
{
"date": "2023-06-13T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2023-07-11T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added CVE-2022-4269, CVE-2023-3141, CVE-2023-3268, CVE-2023-31436, CVE-2023-32233"
},
{
"date": "2023-08-08T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added CVE-2023-3446, CVE-2023-3389, CVE-2022-1015, \r\nCVE-2023-3609"
},
{
"date": "2023-09-12T00:00:00Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added CVE-2023-3338"
},
{
"date": "2023-11-14T00:00:00Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added CVE-2023-1206, CVE-2023-2898, CVE-2023-3610, CVE-2023-3611, CVE-2023-3772, CVE-2023-3773, CVE-2023-3777, CVE-2023-4004, CVE-2023-4015, CVE-2023-4273, CVE-2023-4623, CVE-2023-4921, CVE-2023-35001, CVE-2023-37453, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42753, CVE-2023-42755"
},
{
"date": "2023-12-12T00:00:00Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added CVE-2021-44879, CVE-2023-5178, CVE-2023-5197, CVE-2023-5678, CVE-2023-5717, CVE-2023-31085, CVE-2023-35827, CVE-2023-39189, CVE-2023-42754, CVE-2023-45863, CVE-2023-45871"
},
{
"date": "2024-01-09T00:00:00Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added CVE-2023-48795"
},
{
"date": "2024-02-13T00:00:00Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Added CVE-2020-12762, CVE-2023-6606, CVE-2023-6931, CVE-2023-6932, CVE-2023-7008, CVE-2023-7104, CVE-2023-36660, CVE-2023-50495, CVE-2023-51384, CVE-2023-51385, CVE-2023-51767, CVE-2024-0232, CVE-2024-0553, CVE-2024-0567, CVE-2024-0584, CVE-2024-0684, CVE-2024-22365, CVE-2024-25062"
},
{
"date": "2024-04-09T00:00:00Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Added fix for SIMATIC S7-1500 TM MFP - GNU/Linux subsystem"
}
],
"status": "interim",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.1",
"product": {
"name": "SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-12762",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2021-3759",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-4037",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2021-33655",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-44879",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-44879"
},
{
"cve": "CVE-2022-0171",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-0171"
},
{
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-1015",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1015"
},
{
"cve": "CVE-2022-1184",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u2019s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1292",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1343",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the verification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1343"
},
{
"cve": "CVE-2022-1434",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "When using the RC4-MD5 ciphersuite, which is disabled by default, an attacker is able to modify data in transit due to an incorrect use of the AAD data as the MAC key in OpenSSL 3.0. An attacker is not able to decrypt any communication.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1434"
},
{
"cve": "CVE-2022-1462",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1473",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1473"
},
{
"cve": "CVE-2022-1679",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1852",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1852"
},
{
"cve": "CVE-2022-1882",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1882"
},
{
"cve": "CVE-2022-2068",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-2078",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the Linux kernel\u0027s nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2078"
},
{
"cve": "CVE-2022-2097",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn\u0027t written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-2153",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u2019s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-2274",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2274"
},
{
"cve": "CVE-2022-2327",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "io_uring use work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. Some operations are missing some types, which can lead to incorrect reference counts which can then lead to a double free. We recommend upgrading the kernel past commit df3f3bb5059d20ef094d6b2f0256c4bf4127a859",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2327"
},
{
"cve": "CVE-2022-2503",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-2586",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_api.c function in the Linux kernel. This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-2588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2602",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. A race issue occurs between an io_uring request and the Unix socket garbage collector, allowing an attacker local privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-2663",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"notes": [
{
"category": "summary",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-2905",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2905"
},
{
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2959"
},
{
"cve": "CVE-2022-2978",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2978"
},
{
"cve": "CVE-2022-3028",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3104",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3104"
},
{
"cve": "CVE-2022-3115",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3115"
},
{
"cve": "CVE-2022-3169",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3303",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-3521",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3534",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability classified as critical has been found in Linux Kernel. Affected is the function btf_dump_name_dups of the file tools/lib/bpf/btf_dump.c of the component libbpf. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211032.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3534"
},
{
"cve": "CVE-2022-3545",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3564",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3565",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3586",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u2019s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3594",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3606",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function find_prog_by_sec_insn of the file tools/lib/bpf/libbpf.c of the component BPF. The manipulation leads to null pointer dereference. It is recommended to apply a patch to fix this issue. The identifier VDB-211749 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3606"
},
{
"cve": "CVE-2022-3621",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3625",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3628",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3629",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3633",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3633"
},
{
"cve": "CVE-2022-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3646",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-4095",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-4129",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4139",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4269",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action \"mirred\") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4269"
},
{
"cve": "CVE-2022-4304",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-4450",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-4662",
"cwe": {
"id": "CWE-455",
"name": "Non-exit on Failed Initialization"
},
"notes": [
{
"category": "summary",
"text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-20421",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20421"
},
{
"cve": "CVE-2022-20422",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20422"
},
{
"cve": "CVE-2022-20566",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In l2cap_chan_put of l2cap_core, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-165329981References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20566"
},
{
"cve": "CVE-2022-20572",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "In verity_target of dm-verity-target.c, there is a possible way to modify read-only files due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-234475629References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20572"
},
{
"cve": "CVE-2022-21123",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-21125",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21166",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21505",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"notes": [
{
"category": "summary",
"text": "A bug in the IMA subsystem was discovered which would incorrectly allow kexec to be used when kernel lockdown was enabled",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-21505"
},
{
"cve": "CVE-2022-26373",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-32250"
},
{
"cve": "CVE-2022-32296",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-34918",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-34918"
},
{
"cve": "CVE-2022-36123",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-36123"
},
{
"cve": "CVE-2022-36280",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file \u0027/dev/dri/renderD128 (or Dxxx)\u0027. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-36879",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-39188",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39190",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-39190"
},
{
"cve": "CVE-2022-40307",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40768",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "summary",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-41218",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-41674",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-41849",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-41849"
},
{
"cve": "CVE-2022-41850",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-42328",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "Guests can trigger deadlock in Linux netback driver [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "Guests can trigger deadlock in Linux netback drive. The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42432",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"notes": [
{
"category": "summary",
"text": "This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel 6.0-rc2. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the nft_osf_eval function. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-18540.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42432"
},
{
"cve": "CVE-2022-42703",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42719",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42720",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42721",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42722",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-42895",
"cwe": {
"id": "CWE-824",
"name": "Access of Uninitialized Pointer"
},
"notes": [
{
"category": "summary",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-43750",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-47518",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-47518"
},
{
"cve": "CVE-2022-47520",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-47520"
},
{
"cve": "CVE-2022-47929",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with \"tc qdisc\" and \"tc class\" commands. This affects qdisc_graft in net/sched/sch_api.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-47946",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-47946"
},
{
"cve": "CVE-2023-0215",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0464",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Applications that use a non-default option when verifying certificates may be\r\nvulnerable to an attack from a malicious CA to circumvent certain checks.\r\n\r\nInvalid certificate policies in leaf certificates are silently ignored by\r\nOpenSSL and other certificate policy checks are skipped for that certificate.\r\nA malicious CA could use this to deliberately assert invalid certificate policies\r\nin order to circumvent policy checking on the certificate altogether.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing\r\nthe `-policy` argument to the command line utilities or by calling the\r\n`X509_VERIFY_PARAM_set1_policies()` function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "The function X509_VERIFY_PARAM_add0_policy() is documented to\nimplicitly enable the certificate policy check when doing certificate\nverification. However the implementation of the function does not\nenable the check which allows certificates with invalid or incorrect\npolicies to pass the certificate verification.\n\nAs suddenly enabling the policy check could break existing deployments it was\ndecided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()\nfunction.\n\nInstead the applications that require OpenSSL to perform certificate\npolicy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly\nenable the policy check by calling X509_VERIFY_PARAM_set_flags() with\nthe X509_V_FLAG_POLICY_CHECK flag argument.\n\nCertificate policy checks are disabled by default in OpenSSL and are not\ncommonly used by applications.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0590",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-1077",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-1077"
},
{
"cve": "CVE-2023-1095",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1206",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-1206"
},
{
"cve": "CVE-2023-2898",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-2898"
},
{
"cve": "CVE-2023-3141",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3141"
},
{
"cve": "CVE-2023-3268",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3268"
},
{
"cve": "CVE-2023-3338",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A null pointer dereference flaw was found in the Linux kernel\u0027s DECnet networking protocol. This issue could allow a remote user to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3338"
},
{
"cve": "CVE-2023-3389",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.\r\n\r\nWe recommend upgrading past commit `ef7dfac51d8ed961b742218f526bd589f3900a59` \r\n(`4716c73b188566865bdd79c3a6709696a224ac04` for 5.10 stable and \r\n`0e388fce7aec40992eadee654193cad345d62663` for 5.15 stable).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3389"
},
{
"cve": "CVE-2023-3446",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (\u0027p\u0027 parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \u0027-check\u0027 option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3609",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3609"
},
{
"cve": "CVE-2023-3610",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nFlaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3610"
},
{
"cve": "CVE-2023-3611",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-3772",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3772"
},
{
"cve": "CVE-2023-3773",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3773"
},
{
"cve": "CVE-2023-3777",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nWhen nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain\u0027s owner rule can also release the objects in certain circumstances.\n\nWe recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3777"
},
{
"cve": "CVE-2023-4004",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4004"
},
{
"cve": "CVE-2023-4015",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The netfilter subsystem in the Linux kernel did not properly handle bound chain deactivation in certain circumstances. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4015"
},
{
"cve": "CVE-2023-4273",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "This vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this vulnerability to overflow the kernel stack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4273"
},
{
"cve": "CVE-2023-4623",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4623"
},
{
"cve": "CVE-2023-4911",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4911"
},
{
"cve": "CVE-2023-4921",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4921"
},
{
"cve": "CVE-2023-5178",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious local privileged user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-5178"
},
{
"cve": "CVE-2023-5197",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nAddition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.\r\n\r\nWe recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-5197"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5717",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\r\n\r\nIf perf_read_group() is called while an event\u0027s sibling_list is smaller than its child\u0027s sibling_list, it can increment or write to memory locations outside of the allocated buffer.\r\n\r\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-5717"
},
{
"cve": "CVE-2023-6606",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-6606"
},
{
"cve": "CVE-2023-6931",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-6931"
},
{
"cve": "CVE-2023-6932",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-6932"
},
{
"cve": "CVE-2023-7008",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-7008"
},
{
"cve": "CVE-2023-7104",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-7104"
},
{
"cve": "CVE-2023-23454",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-23455",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-23559",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-26607",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-26607"
},
{
"cve": "CVE-2023-31085",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd-\u003eerasesize), used indirectly by ctrl_cdev_ioctl, when mtd-\u003eerasesize is 0.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-31085"
},
{
"cve": "CVE-2023-31436",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-31436"
},
{
"cve": "CVE-2023-32233",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-32233"
},
{
"cve": "CVE-2023-35001",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-35001"
},
{
"cve": "CVE-2023-35827",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-35827"
},
{
"cve": "CVE-2023-36660",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The OCB feature in libnettle in Nettle 3.9 before 3.9.1 allows memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-36660"
},
{
"cve": "CVE-2023-37453",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-37453"
},
{
"cve": "CVE-2023-39189",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-39189"
},
{
"cve": "CVE-2023-39192",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-39192"
},
{
"cve": "CVE-2023-39193",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-39193"
},
{
"cve": "CVE-2023-39194",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-39194"
},
{
"cve": "CVE-2023-42753",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-42754",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-42754"
},
{
"cve": "CVE-2023-42755",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-42755"
},
{
"cve": "CVE-2023-45863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-45863"
},
{
"cve": "CVE-2023-45871",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-45871"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "summary",
"text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-50495",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-50495"
},
{
"cve": "CVE-2023-51384",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-51767",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-51767"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0553",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-0553"
},
{
"cve": "CVE-2024-0567",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-0567"
},
{
"cve": "CVE-2024-0584",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-0584"
},
{
"cve": "CVE-2024-0684",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the GNU coreutils \"split\" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-0684"
},
{
"cve": "CVE-2024-22365",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-22365"
},
{
"cve": "CVE-2024-25062",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-25062"
}
]
}
SSA-794697
Vulnerability from csaf_siemens
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
"tlp": {
"label": "WHITE"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.0.\n\nSiemens has released a new version for SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem and recommends to update to the latest version.\n\nThis advisory lists vulnerabilities for firmware version V1.0 only; for V1.1 refer to Siemens Security Advisory SSA-265688 (\nhttps://cert-portal.siemens.com/productcert/html/ssa-265688.html).",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - HTML Version",
"url": "https://cert-portal.siemens.com/productcert/html/ssa-794697.html"
},
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-794697.json"
},
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-794697.pdf"
},
{
"category": "self",
"summary": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1 - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-794697.txt"
}
],
"title": "SSA-794697: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP before V1.1",
"tracking": {
"current_release_date": "2024-04-09T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-794697",
"initial_release_date": "2023-06-13T00:00:00Z",
"revision_history": [
{
"date": "2023-06-13T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2023-07-11T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added CVE-2022-4269, CVE-2023-3141, CVE-2023-3268, CVE-2023-31436, CVE-2023-32233"
},
{
"date": "2023-08-08T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added CVE-2023-3446, CVE-2023-3389, CVE-2022-1015, \r\nCVE-2023-3609"
},
{
"date": "2023-09-12T00:00:00Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Added CVE-2023-3338"
},
{
"date": "2023-11-14T00:00:00Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Added CVE-2023-1206, CVE-2023-2898, CVE-2023-3610, CVE-2023-3611, CVE-2023-3772, CVE-2023-3773, CVE-2023-3777, CVE-2023-4004, CVE-2023-4015, CVE-2023-4273, CVE-2023-4623, CVE-2023-4921, CVE-2023-35001, CVE-2023-37453, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-42753, CVE-2023-42755"
},
{
"date": "2023-12-12T00:00:00Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Added CVE-2021-44879, CVE-2023-5178, CVE-2023-5197, CVE-2023-5678, CVE-2023-5717, CVE-2023-31085, CVE-2023-35827, CVE-2023-39189, CVE-2023-42754, CVE-2023-45863, CVE-2023-45871"
},
{
"date": "2024-01-09T00:00:00Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Added CVE-2023-48795"
},
{
"date": "2024-02-13T00:00:00Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Added CVE-2020-12762, CVE-2023-6606, CVE-2023-6931, CVE-2023-6932, CVE-2023-7008, CVE-2023-7104, CVE-2023-36660, CVE-2023-50495, CVE-2023-51384, CVE-2023-51385, CVE-2023-51767, CVE-2024-0232, CVE-2024-0553, CVE-2024-0567, CVE-2024-0584, CVE-2024-0684, CVE-2024-22365, CVE-2024-25062"
},
{
"date": "2024-04-09T00:00:00Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Added fix for SIMATIC S7-1500 TM MFP - GNU/Linux subsystem"
}
],
"status": "interim",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV1.1",
"product": {
"name": "SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "SIMATIC S7-1500 TM MFP -\u00a0GNU/Linux subsystem"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-12762",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2021-3759",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-3759"
},
{
"cve": "CVE-2021-4037",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2021-33655",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-44879",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-44879"
},
{
"cve": "CVE-2022-0171",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-0171"
},
{
"cve": "CVE-2022-1012",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1012"
},
{
"cve": "CVE-2022-1015",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1015"
},
{
"cve": "CVE-2022-1184",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u2019s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1292",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1343",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the verification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1343"
},
{
"cve": "CVE-2022-1434",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"notes": [
{
"category": "summary",
"text": "When using the RC4-MD5 ciphersuite, which is disabled by default, an attacker is able to modify data in transit due to an incorrect use of the AAD data as the MAC key in OpenSSL 3.0. An attacker is not able to decrypt any communication.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1434"
},
{
"cve": "CVE-2022-1462",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read flaw was found in the Linux kernel\u2019s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1473",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1473"
},
{
"cve": "CVE-2022-1679",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1852",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1852"
},
{
"cve": "CVE-2022-1882",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-1882"
},
{
"cve": "CVE-2022-2068",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-2078",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in the Linux kernel\u0027s nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2078"
},
{
"cve": "CVE-2022-2097",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn\u0027t written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-2153",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u2019s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-2274",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2274"
},
{
"cve": "CVE-2022-2327",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "io_uring use work_flags to determine which identity need to grab from the calling process to make sure it is consistent with the calling process when executing IORING_OP. Some operations are missing some types, which can lead to incorrect reference counts which can then lead to a double free. We recommend upgrading the kernel past commit df3f3bb5059d20ef094d6b2f0256c4bf4127a859",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2327"
},
{
"cve": "CVE-2022-2503",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-2586",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_api.c function in the Linux kernel. This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2586"
},
{
"cve": "CVE-2022-2588",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2602",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. A race issue occurs between an io_uring request and the Unix socket garbage collector, allowing an attacker local privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2602"
},
{
"cve": "CVE-2022-2663",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"notes": [
{
"category": "summary",
"text": "An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-2905",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds memory read flaw was found in the Linux kernel\u0027s BPF subsystem in how a user calls the bpf_tail_call function with a key larger than the max_entries of the map. This flaw allows a local user to gain unauthorized access to data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2905"
},
{
"cve": "CVE-2022-2959",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2959"
},
{
"cve": "CVE-2022-2978",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-2978"
},
{
"cve": "CVE-2022-3028",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3104",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3104"
},
{
"cve": "CVE-2022-3115",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3115"
},
{
"cve": "CVE-2022-3169",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel. A denial of service flaw may occur if there is a consecutive request of the NVME_IOCTL_RESET and the NVME_IOCTL_SUBSYS_RESET through the device file of the driver, resulting in a PCIe link disconnect.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-3303",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3303"
},
{
"cve": "CVE-2022-3521",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function kcm_tx_work of the file net/kcm/kcmsock.c of the component kcm. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211018 is the identifier assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-3534",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability classified as critical has been found in Linux Kernel. Affected is the function btf_dump_name_dups of the file tools/lib/bpf/btf_dump.c of the component libbpf. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211032.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3534"
},
{
"cve": "CVE-2022-3545",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3564",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3565",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3586",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u2019s networking code. A use-after-free was found in the way the sch_sfb enqueue function used the socket buffer (SKB) cb field after the same SKB had been enqueued (and freed) into a child qdisc. This flaw allows a local, unprivileged user to crash the system, causing a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3594",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3606",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function find_prog_by_sec_insn of the file tools/lib/bpf/libbpf.c of the component BPF. The manipulation leads to null pointer dereference. It is recommended to apply a patch to fix this issue. The identifier VDB-211749 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3606"
},
{
"cve": "CVE-2022-3621",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_bmap_lookup_at_level of the file fs/nilfs2/inode.c of the component nilfs2. The manipulation leads to null pointer dereference. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211920.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3625",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3625"
},
{
"cve": "CVE-2022-3628",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-3629",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3633",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability classified as problematic has been found in Linux Kernel. Affected is the function j1939_session_destroy of the file net/can/j1939/transport.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211932.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3633"
},
{
"cve": "CVE-2022-3635",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function tst_timer of the file drivers/atm/idt77252.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. VDB-211934 is the identifier assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3646",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability, which was classified as problematic, has been found in Linux Kernel. This issue affects the function nilfs_attach_log_writer of the file fs/nilfs2/segment.c of the component BPF. The manipulation leads to memory leak. The attack may be initiated remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211961 was assigned to this vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is the function nilfs_new_inode of the file fs/nilfs2/inode.c of the component BPF. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211992.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-4095",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-4129",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u0027s Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4139",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "summary",
"text": "An incorrect TLB flush issue was found in the Linux kernel\u2019s GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4139"
},
{
"cve": "CVE-2022-4269",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action \"mirred\") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4269"
},
{
"cve": "CVE-2022-4304",
"cwe": {
"id": "CWE-326",
"name": "Inadequate Encryption Strength"
},
"notes": [
{
"category": "summary",
"text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-4450",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "summary",
"text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-4662",
"cwe": {
"id": "CWE-455",
"name": "Non-exit on Failed Initialization"
},
"notes": [
{
"category": "summary",
"text": "A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-20421",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20421"
},
{
"cve": "CVE-2022-20422",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20422"
},
{
"cve": "CVE-2022-20566",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In l2cap_chan_put of l2cap_core, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-165329981References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20566"
},
{
"cve": "CVE-2022-20572",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "summary",
"text": "In verity_target of dm-verity-target.c, there is a possible way to modify read-only files due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-234475629References: Upstream kernel",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-20572"
},
{
"cve": "CVE-2022-21123",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-21125",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21166",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"notes": [
{
"category": "summary",
"text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21505",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"notes": [
{
"category": "summary",
"text": "A bug in the IMA subsystem was discovered which would incorrectly allow kexec to be used when kernel lockdown was enabled",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-21505"
},
{
"cve": "CVE-2022-26373",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-32250",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-32250"
},
{
"cve": "CVE-2022-32296",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.17.9 allows TCP servers to identify clients by observing what source ports are used. This occurs because of use of Algorithm 4 (\"Double-Hash Port Selection Algorithm\") of RFC 6056.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-32296"
},
{
"cve": "CVE-2022-34918",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-34918"
},
{
"cve": "CVE-2022-36123",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "summary",
"text": "The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-36123"
},
{
"cve": "CVE-2022-36280",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file \u0027/dev/dri/renderD128 (or Dxxx)\u0027. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-36879",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-\u003elen.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-39188",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39190",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-39190"
},
{
"cve": "CVE-2022-40307",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 5.19.8. drivers/firmware/efi/capsule-loader.c has a race condition with a resultant use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40768",
"cwe": {
"id": "CWE-668",
"name": "Exposure of Resource to Wrong Sphere"
},
"notes": [
{
"category": "summary",
"text": "drivers/scsi/stex.c in the Linux kernel through 5.19.9 allows local users to obtain sensitive information from kernel memory because stex_queuecommand_lck lacks a memset for the PASSTHRU_CMD case.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-41218",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-41222",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-41222"
},
{
"cve": "CVE-2022-41674",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-41674"
},
{
"cve": "CVE-2022-41849",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-41849"
},
{
"cve": "CVE-2022-41850",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report-\u003evalue is in progress.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-42328",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "Guests can trigger deadlock in Linux netback driver [This CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"cwe": {
"id": "CWE-667",
"name": "Improper Locking"
},
"notes": [
{
"category": "summary",
"text": "Guests can trigger deadlock in Linux netback drive. The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42432",
"cwe": {
"id": "CWE-457",
"name": "Use of Uninitialized Variable"
},
"notes": [
{
"category": "summary",
"text": "This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel 6.0-rc2. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the nft_osf_eval function. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-18540.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42432"
},
{
"cve": "CVE-2022-42703",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42719",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42719"
},
{
"cve": "CVE-2022-42720",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42720"
},
{
"cve": "CVE-2022-42721",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42721"
},
{
"cve": "CVE-2022-42722",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42722"
},
{
"cve": "CVE-2022-42895",
"cwe": {
"id": "CWE-824",
"name": "Access of Uninitialized Pointer"
},
"notes": [
{
"category": "summary",
"text": "There is an infoleak vulnerability in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_parse_conf_req function which can be used to leak kernel pointers remotely. We recommend upgrading past commit https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "There are use-after-free vulnerabilities in the Linux kernel\u0027s net/bluetooth/l2cap_core.c\u0027s l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth. A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim. We recommend upgrading past commit https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-43750",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor\u0027s internal memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-47518",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-47518"
},
{
"cve": "CVE-2022-47520",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-47520"
},
{
"cve": "CVE-2022-47929",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with \"tc qdisc\" and \"tc class\" commands. This affects qdisc_graft in net/sched/sch_api.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-47946",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel 5.10.x before 5.10.155. A use-after-free in io_sqpoll_wait_sq in fs/io_uring.c allows an attacker to crash the kernel, resulting in denial of service. finish_wait can be skipped. An attack can occur in some situations by forking a process and then quickly terminating it. NOTE: later kernel versions, such as the 5.15 longterm series, substantially changed the implementation of io_sqpoll_wait_sq.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2022-47946"
},
{
"cve": "CVE-2023-0215",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0464",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "Applications that use a non-default option when verifying certificates may be\r\nvulnerable to an attack from a malicious CA to circumvent certain checks.\r\n\r\nInvalid certificate policies in leaf certificates are silently ignored by\r\nOpenSSL and other certificate policy checks are skipped for that certificate.\r\nA malicious CA could use this to deliberately assert invalid certificate policies\r\nin order to circumvent policy checking on the certificate altogether.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing\r\nthe `-policy` argument to the command line utilities or by calling the\r\n`X509_VERIFY_PARAM_set1_policies()` function.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "summary",
"text": "The function X509_VERIFY_PARAM_add0_policy() is documented to\nimplicitly enable the certificate policy check when doing certificate\nverification. However the implementation of the function does not\nenable the check which allows certificates with invalid or incorrect\npolicies to pass the certificate verification.\n\nAs suddenly enabling the policy check could break existing deployments it was\ndecided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()\nfunction.\n\nInstead the applications that require OpenSSL to perform certificate\npolicy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly\nenable the policy check by calling X509_VERIFY_PARAM_set_flags() with\nthe X509_V_FLAG_POLICY_CHECK flag argument.\n\nCertificate policy checks are disabled by default in OpenSSL and are not\ncommonly used by applications.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0590",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 (\"net: sched: fix race condition in qdisc_graft()\") not applied yet, then kernel could be affected.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-1077",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-1077"
},
{
"cve": "CVE-2023-1095",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1206",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-1206"
},
{
"cve": "CVE-2023-2898",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "There is a null-pointer-dereference flaw found in f2fs_write_end_io in fs/f2fs/data.c in the Linux kernel. This flaw allows a local privileged user to cause a denial of service problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-2898"
},
{
"cve": "CVE-2023-3141",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3141"
},
{
"cve": "CVE-2023-3268",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3268"
},
{
"cve": "CVE-2023-3338",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A null pointer dereference flaw was found in the Linux kernel\u0027s DECnet networking protocol. This issue could allow a remote user to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3338"
},
{
"cve": "CVE-2023-3389",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.\r\n\r\nWe recommend upgrading past commit `ef7dfac51d8ed961b742218f526bd589f3900a59` \r\n(`4716c73b188566865bdd79c3a6709696a224ac04` for 5.10 stable and \r\n`0e388fce7aec40992eadee654193cad345d62663` for 5.15 stable).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3389"
},
{
"cve": "CVE-2023-3446",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (\u0027p\u0027 parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \u0027-check\u0027 option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3609",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3609"
},
{
"cve": "CVE-2023-3610",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nFlaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3610"
},
{
"cve": "CVE-2023-3611",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-3772",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3772"
},
{
"cve": "CVE-2023-3773",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3773"
},
{
"cve": "CVE-2023-3777",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nWhen nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain\u0027s owner rule can also release the objects in certain circumstances.\n\nWe recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-3777"
},
{
"cve": "CVE-2023-4004",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4004"
},
{
"cve": "CVE-2023-4015",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "The netfilter subsystem in the Linux kernel did not properly handle bound chain deactivation in certain circumstances. A local attacker could possibly use this to cause a denial of service (system crash) or execute arbitrary code.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4015"
},
{
"cve": "CVE-2023-4273",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "This vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this vulnerability to overflow the kernel stack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4273"
},
{
"cve": "CVE-2023-4623",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4623"
},
{
"cve": "CVE-2023-4911",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4911"
},
{
"cve": "CVE-2023-4921",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-4921"
},
{
"cve": "CVE-2023-5178",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious local privileged user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation problem.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-5178"
},
{
"cve": "CVE-2023-5197",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\r\n\r\nAddition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.\r\n\r\nWe recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-5197"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "summary",
"text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5717",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\r\n\r\nIf perf_read_group() is called while an event\u0027s sibling_list is smaller than its child\u0027s sibling_list, it can increment or write to memory locations outside of the allocated buffer.\r\n\r\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-5717"
},
{
"cve": "CVE-2023-6606",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-6606"
},
{
"cve": "CVE-2023-6931",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-6931"
},
{
"cve": "CVE-2023-6932",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-6932"
},
{
"cve": "CVE-2023-7008",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-7008"
},
{
"cve": "CVE-2023-7104",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-7104"
},
{
"cve": "CVE-2023-23454",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-23455",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "summary",
"text": "atm_tc_enqueue in net/sched/sch_atm.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-23559",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "summary",
"text": "In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-26607",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel 6.0.8, there is an out-of-bounds read in ntfs_attr_find in fs/ntfs/attrib.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-26607"
},
{
"cve": "CVE-2023-31085",
"cwe": {
"id": "CWE-369",
"name": "Divide By Zero"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd-\u003eerasesize), used indirectly by ctrl_cdev_ioctl, when mtd-\u003eerasesize is 0.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-31085"
},
{
"cve": "CVE-2023-31436",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "qfq_change_class in net/sched/sch_qfq.c in the Linux kernel before 6.2.13 allows an out-of-bounds write because lmax can exceed QFQ_MIN_LMAX.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-31436"
},
{
"cve": "CVE-2023-32233",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-32233"
},
{
"cve": "CVE-2023-35001",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-35001"
},
{
"cve": "CVE-2023-35827",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the Linux kernel through 6.3.8. A use-after-free was found in ravb_remove in drivers/net/ethernet/renesas/ravb_main.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-35827"
},
{
"cve": "CVE-2023-36660",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "The OCB feature in libnettle in Nettle 3.9 before 3.9.1 allows memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-36660"
},
{
"cve": "CVE-2023-37453",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-37453"
},
{
"cve": "CVE-2023-39189",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-39189"
},
{
"cve": "CVE-2023-39192",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-39192"
},
{
"cve": "CVE-2023-39193",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-39193"
},
{
"cve": "CVE-2023-39194",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-39194"
},
{
"cve": "CVE-2023-42753",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-42754",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "summary",
"text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-42754"
},
{
"cve": "CVE-2023-42755",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-42755"
},
{
"cve": "CVE-2023-45863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-45863"
},
{
"cve": "CVE-2023-45871",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-45871"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "summary",
"text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust; and there could be effects on Bitvise SSH through 9.31.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-50495",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-50495"
},
{
"cve": "CVE-2023-51384",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-51767",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "OpenSSH through 9.6, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2023-51767"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A heap use-after-free issue has been identified in SQLite in the jsonParseAddNodeArray() function in sqlite3.c. This flaw allows a local attacker to leverage a victim to pass specially crafted malicious input to the application, potentially causing a crash and leading to a denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0553",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-0553"
},
{
"cve": "CVE-2024-0567",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-0567"
},
{
"cve": "CVE-2024-0584",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-0584"
},
{
"cve": "CVE-2024-0684",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A flaw was found in the GNU coreutils \"split\" program. A heap overflow with user-controlled data of multiple hundred bytes in length could occur in the line_bytes_split() function, potentially leading to an application crash and denial of service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-0684"
},
{
"cve": "CVE-2024-22365",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-22365"
},
{
"cve": "CVE-2024-25062",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "summary",
"text": "An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V1.1 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109827684/"
},
{
"category": "workaround",
"details": "Only build and run applications from trusted sources",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2024-25062"
}
]
}
fkie_cve-2022-1012
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2064604 | Issue Tracking, Third Party Advisory | |
| secalert@redhat.com | https://lore.kernel.org/lkml/20220427065233.2075-1-w%401wt.eu/T/ | ||
| secalert@redhat.com | https://security.netapp.com/advisory/ntap-20221020-0006/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2064604 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lore.kernel.org/lkml/20220427065233.2075-1-w%401wt.eu/T/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20221020-0006/ | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | 5.18 | |
| linux | linux_kernel | 5.18 | |
| linux | linux_kernel | 5.18 | |
| linux | linux_kernel | 5.18 | |
| linux | linux_kernel | 5.18 | |
| linux | linux_kernel | 5.18 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE93544F-B946-47CF-9697-FBF3484FCB92",
"versionEndExcluding": "5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:-:*:*:*:*:*:*",
"matchCriteriaId": "0384FA0A-DE99-48D7-84E3-46ED0C3B5E03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "6AD94161-84BB-42E6-9882-4FC0C42E9FC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "7AB06DDF-3C2B-416D-B448-E990D8FF67A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "EAE6C6C5-4D21-4C04-897C-70CBBB3D7B91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*",
"matchCriteriaId": "DA5F085D-52F3-4EE2-8353-455D1A6FE073",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*",
"matchCriteriaId": "D6EE5B78-0D83-4715-893C-ABD69B49E7FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem."
},
{
"lang": "es",
"value": "Se ha encontrado un problema de p\u00e9rdida de memoria en el algoritmo de generaci\u00f3n de puertos de origen TCP en el archivo net/ipv4/tcp.c debido al peque\u00f1o tama\u00f1o de la tabla de perturbaci\u00f3n. Este fallo puede permitir a un atacante un filtrado de informaci\u00f3n y puede causar un problema de denegaci\u00f3n de servicio"
}
],
"id": "CVE-2022-1012",
"lastModified": "2024-11-21T06:39:51.467",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-08-05T16:15:11.370",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"source": "secalert@redhat.com",
"url": "https://lore.kernel.org/lkml/20220427065233.2075-1-w%401wt.eu/T/"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20221020-0006/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064604"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lore.kernel.org/lkml/20220427065233.2075-1-w%401wt.eu/T/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20221020-0006/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "secalert@redhat.com",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.